Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'mls' = '"%APPDATA%\RAC\mls.exe" -s'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svcsc.exe' = '%APPDATA%\RAC\svcsc.exe'
- %TEMP%\420612751.tmp
- %TEMP%\rcxb97f.tmp
- %TEMP%\rcxba1c.tmp
- <PATH_SAMPLE>.doc
- %TEMP%\1443212764.tmp
- <PATH_SAMPLE>.doc
- from %TEMP%\rcxb97f.tmp to %TEMP%\420612751.tmp
- from %TEMP%\rcxba1c.tmp to %TEMP%\420612751.tmp
- from %TEMP%\420612751.tmp to %APPDATA%\rac\mls.exe
- 'wx###lytics.ru':80
- http://wx###lytics.ru/net.exe.config
- DNS ASK wx###lytics.ru
- '%APPDATA%\rac\mls.exe' -s
- '%ProgramFiles%\microsoft office\office14\winword.exe' /n "<PATH_SAMPLE>.doc"' (with hidden window)
- '%APPDATA%\rac\mls.exe' -s' (with hidden window)
- '%ProgramFiles%\microsoft office\office14\winword.exe' /n "<PATH_SAMPLE>.doc"