EP_X0FF wrote:Nothing new, just statement of the fact known for a few weeks.They read kernelmode.info in the r/o mode? [this is sarcasm]
A forum for reverse engineering, OS internals and malware analysis
EP_X0FF wrote:Nothing new, just statement of the fact known for a few weeks.They read kernelmode.info in the r/o mode? [this is sarcasm]
EP_X0FF wrote:I don't think they even knows about it. Otherwise they are really slowpokes. Remember Prevx, captain obvious from prevx was lurking here during TDL4 discovery and immediatelly copy-pasted everything in it's blog when TDL4 was found and confirmed.Man,that's really bad :( .Did you do anything about it?As i've already mentioned,it's funny how some very talented and skilled persons are "getting wasted in a forum"(Please don't get this wrong) when they could work for other companies,EP_X0FF,Rkhunter,evilcry,xylitol and many others.
tachion wrote:ZeroAccess - SirefefWinXP SP3
74acfbfc68968af240fe363e22716c5e
https://www.virustotal.com/file/28db4e9 ... /analysis/
thisisu wrote:Just posting this for reference ;)Don't remember that it was before, but...
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}
Default should be: %SystemRoot%\system32\shdocvw.dll