Figure2 | WeLiveSecurity

Figure2

Figure 2 - The digital signature of the malicious Transmission application