صفحه 1:

صفحه 2:
ae ۱۳۳2/۰ . De eee ‏ا‎ eer powpoy Oins@ObkOde to with COIO. © dourceist @rica Krebs's blow posi va IS uly SodO wes the First widely reed report vd the wore. © Dhe origin cave qued by Oins@bkOde wos "Rovikit. Voophider"; Gpwodter however velled it 099 ‏رز ۱ ,او‎ ی و ی یا ای ای

صفحه 3:

صفحه 4:
SS | Mabie | Neweletar Home | Video | Themen | Forum | Engish DER SPIEGEL SPIEGELTV | Aba Shop 1 a FrontPage | World Europe Germany | Business | Zeigeist |BeyoncTomerrow |Newslater 7ل 2013 ۷۵ 5۲۱0۷۷۵6۱ ۴00/۵۲۵ ‘Awoman walks pasta banner in Hong Kong in suppor of whistleblower Edward Snowden. In an interview conducted using encrypted e-mails, whistleblower Edward Snowden discusses the power of the NSA, how it is “in bed together with the Germans" and the vast scope of intemet spying conducted by the United States and Britain.

صفحه 5:

صفحه 6:
له ما هب اه 0 ‎Plask drive.‏ 2)20) له مه نان -0002-200000 0 ددا 0106:029- 0 ۱۷۱ ۳/6 ا ‎Orr Var Cea Aen Ad‏ \ رام :9۱۵0 ‎WOrvel eter %\Ovpy oP Ovpy oF Gkortou tots CIWS ra Ao Sere Lomeye Nomen tc ee afar ‎ ‎ah Oe EO Ot A ‏اه‎ ‎see +‏ ات ‏سس سيو لصوت | ‎ee‏ | > ۱۱۳۳ ۲

صفحه 7:
۸۱ ۲ Memoryze™ Dunplt — vi.3.2.20110401 — One click memory memory dumper Gopyright <c)"2607 — 2011, Matthicu Suiche Chttp://wumsuiche -net? ] ta Come: Ree OL LC ad as eee eed Ec Ce cSt ‏ا ا‎ ares SUcees crag 14115291136 hytes ¢ 13461 Mb> Peroni Se et eee OC 1 + Processing...

صفحه 8:
™ python’

صفحه 9:
“| 4 0 ۹/۹ tire ee وت" ع ۷7220 ۱ ۱ el eee

صفحه 10:
570100 0۱۱ جع 97۱۷

صفحه 11:
s7otbxdx.dil read

صفحه 12:

صفحه 13:

صفحه 14:
‎of‏ سا ‎2 ‎

صفحه 15:
‎pcs UIE aa Ud‏ للا ‎ ‏۵ ‏80076 ‏۱9/۵ ‏0 ‏0 ‏20 0 0 0 ‎٠ Ge‏ 2 حو أ فين ‎ai‏ ل 20 ۳ 8 + 90 ‎١‏ ۵ 6 0 ‎g 5‏ 9 ۵ 0 9 وس ار ۱0۵ وو؟ ‎

صفحه 16:

صفحه 17:
based ta Trad (et ara ane Pac)

صفحه 18:
en eee 0 813 6 0 ‎ee eT)‏ ك1 ‎ ‎ ‏الريك

صفحه 19:
ري انك << 2 (505 OE ee ‏فم لسعو‎ 7

صفحه 20:
REUTERS ۱3 NEWS by gel PUA ile PS 138811 (۳ 600۱

صفحه 21:
KON) 2 S00

صفحه 22:
‎hat‏ 2اه ‏ن ‏0 5 اس : ‎S ¢‏ ‎z 0‏ = -_- = ‎ry wn‏ ۳ ‎ ‎

صفحه 23:
0 ‏مان‎ ae

History    The worm was at first identified by the security company VirusBlokAda in mid-June 2010. Journalist Brian Krebs's blog posting on 15 July 2010 was the first widely read report on the worm. The original name given by VirusBlokAda was "Rootkit.Tmphider"; Symantec however called it "W32.Temphid", later changing to "W32.Stuxnet" 1 1 20 r a u n Ja 6 1 y 2013 Juillet 7 S X tu t e n 5MB Design and organization  Stuxnet is typically introduced to the target environment via an infected USB flash drive. %DriveLetter%\~WTR4132.tmp %DriveLetter%\~WTR4141.tmp CVE-20102568 LNK %DriveLetter%\Copy of Shortcut to.lnk %DriveLetter%\Copy of Copy of Shortcut to.lnk %DriveLetter%\Copy of Copy of Copy of Shortcut to.lnk %DriveLetter%\Copy of Copy of Copy of Copy of Shortcut to.lnk MDD KnTDD Nigilant32 Memoryze DD Volatility Trojan Dropper Win32/Stuxnet Trojan:WinNT/Stuxnet.A Trojan:WinNT/Stuxnet.B 1210 - 807 1410 2 1064 Microsoft Windows 2000 Windows 95 Windows 98 Windows Me Windows NT Windows Server 2003 Operating systems vulnerable Windows Vista Windows XP Microsoft Target Vacon based in Finland Fararo Paya based in Iran PLC-BLASTER References Stuxnet Malware Analysis Mohammad Reza Foshtanghi Islamic Azad University Of Sabzevar 1395/1/28

51,000 تومان