Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'COM Surrogate' = '"%APPDATA%\Windows\dllhost.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'COM Surrogate' = '"%TEMP%\RarSFX0\dllhost.exe"'
- '<SYSTEM32>\schtasks.exe' /create /tn "COM Surrogate" /sc ONLOGON /tr "%APPDATA%\Windows\dllhost.exe" /rl HIGHEST /f
- '%TEMP%\RarSFX0\Farm Bot Alpha.exe'
- '%APPDATA%\Windows\dllhost.exe'
- '%TEMP%\RarSFX0\dllhost.exe'
- '<SYSTEM32>\schtasks.exe' /create /tn "COM Surrogate" /sc ONLOGON /tr "%TEMP%\RarSFX0\dllhost.exe" /rl HIGHEST /f
- %APPDATA%\Windows\dllhost.exe
- %APPDATA%\Windows logs\03-23-2017
- %TEMP%\RarSFX0\dllhost.exe
- %TEMP%\RarSFX0\Farm Bot Alpha.exe
- %APPDATA%\Windows\dllhost.exe
- 'ap#.#pify.org':80
- 'mi####.duckdns.org':1213
- 'ip##pi.com':80
- 'fr###eoip.net':80
- http://ap#.#pify.org/
- http://fr###eoip.net/xml/
- http://ip##pi.com/json/
- DNS ASK ap#.#pify.org
- DNS ASK mi####.duckdns.org
- DNS ASK ip##pi.com
- DNS ASK fr###eoip.net
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'EDIT' WindowName: ''