Техническая информация
- [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'COM Surrogate' = '%ALLUSERSPROFILE%\COM Surrogate.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%WINDIR%\COM Surrogate.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'COM Surrogate.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%ALLUSERSPROFILE%\COM Surrogate.exe'
- %WINDIR%\com surrogate.exe
- %ALLUSERSPROFILE%\com surrogate.exe
- 'pa###bin.com':443
- 'pk#.goog':80
- http://pk#.goog/gsr1/gsr1.crt
- 'pa###bin.com':443
- DNS ASK pa###bin.com
- DNS ASK pk#.goog
- '%WINDIR%\com surrogate.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%WINDIR%\COM Surrogate.exe' (со скрытым окном)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'COM Surrogate.exe' (со скрытым окном)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%ALLUSERSPROFILE%\COM Surrogate.exe' (со скрытым окном)