The malware issues commands via a hardcoded charcode table and Microsoft COM object interfaces
This article has been indexed from www.infosecurity-magazine.com
The malware issues commands via a hardcoded charcode table and Microsoft COM object interfaces