Technical Information
- NtQuerySystemInformation, handler: jinfuhide.dat
- <Full path to virus>
- <Current directory>\jinfuhide.dat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\665wg[1]
- <Current directory>\superec.ProcessMemory.sys
- <Current directory>\Hook.dll
- <Current directory>\jinfuhide.dat
- <Current directory>\Hook.dll
- <Current directory>\jinfuhide.dat
- <Current directory>\superec.ProcessMemory.sys
- 'www.66##g.com':80
- 'localhost':1035
- www.66##g.com/
- www.66##g.com/1.txt
- DNS ASK www.66##g.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: '(null)' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'