Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'twunk_32.exe' = '%APPDATA%\Roaming\WF9iXmlYVg==\twunk_32.exe'
- '%APPDATA%\Roaming\WF9iXmlYVg==\twunk_32.exe' <Full path to virus>
- %APPDATA%\Roaming\WF9iXmlYVg==\twunk_32.exe
- %APPDATA%\Roaming\WF9iXmlYVg==\twunk_32.exe
- DNS ASK dn#.##ftncsi.com
- DNS ASK ct###.#indowsupdate.com
- ClassName: 'Shell_TrayWnd' WindowName: ''