Technical Information
- NtQuerySystemInformation, handler: jinfuhide.dat
- <Full path to virus>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\yy[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\yy[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\890848385[1]
- <Current directory>\SkinH_EL.dll
- <Current directory>\superec.ProcessMemory.sys
- <Current directory>\Hook.dll
- <Current directory>\jinfuhide.dat
- <Current directory>\SkinH_EL.dll
- <Current directory>\superec.ProcessMemory.sys
- <Current directory>\jinfuhide.dat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\yy[1]
- <Current directory>\Hook.dll
- <Current directory>\jinfuhide.dat
- 'yy.com':80
- 'localhost':1035
- yy.com/5667/890848385
- yy.com/
- DNS ASK yy.com
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'