Technical Information
- [<HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'tmpB589.tmptvbdvaj' = '%APPDATA%\tmpB589.tmptvbdvaj.exe'
- %APPDATA%\microsoft\windows\start menu\programs\startup\tmpb589.tmptvbdvaj.exe
- <Drive name for removable media>:\tady zalohy.exe
- %TEMP%\tmpb589.tmptvbdvaj.exe
- %TEMP%\tmpb7bb.tmppipwid.exe
- %APPDATA%\tmpb589.tmptvbdvaj.exe
- 'pa###bin.com':443
- 'ip##pi.com':80
- '16#.#3.242.98':6887
- http://ip##pi.com/line/?fi############
- 'pa###bin.com':443
- DNS ASK ip##pi.com
- DNS ASK pa###bin.com
- ClassName: 'Shell_traywnd' WindowName: ''
- '%TEMP%\tmpb589.tmptvbdvaj.exe'
- '%TEMP%\tmpb7bb.tmppipwid.exe'