Figure1 | WeLiveSecurity

Figure1

Figure 1 – The disguise used by the malware at the time of writing