Description: backdoor kernel-level software, users of the software can be hidden files, processes, systems and services, the system drive, registry keys and the keys , open ports and fictitious available disk space. Programs are also memory camouflage it changes made to the stealth and hidden control process. Installation hidden back door, registered hidden and system services to install the system drive.
File list (Check if you may need any files):
read it.txt
src
...\bdcli100.dpr
...\driver
...\......\driver.c
...\......\driver.h
...\......\driver.sys
...\......\makefile
...\......\sources
...\driver.res
...\hxdef100.dpr
...\rdrbs100.dpr
...\rdrbs100.res
...\units
...\.....\UJQCompress.pas
...\.....\UList.pas
...\.....\UProcAPI.pas
...\.....\USysUtils-Case.inc
...\.....\USysUtils-NumStrConv.inc
...\.....\USysUtils.pas
...\.....\UTcp.pas