Analysis of the malware of Red October - Part 2