New in November 2009

With 20 years of experience at studying software without source code, I have occasionally wondered if I have something useful to contribute to the anti-virus industry. The few new pages this month are a one-off experiment. The aim is to alert the industry to an analytical resource that is demonstrably superior at getting detail and which the industry can perhaps use to its advantage. I have chosen malware that the industry certainly looks to have wanted to understand in detail. Though all other reports seem to be derived from observation, e.g., with a debugger and other such tools, mine comes entirely from inspection of the binary code without running the software.

Notes