Figure1 | WeLiveSecurity

Figure1

Figure 1 – Distribution of ESET detections of the cryptominer