Figure2

Figure2

Figure 2. The Changing Information Technology Inc. code signing certificate used to sign malware