Source: https://repo.zenk-security.com/Virus-Infections-Detections-Preventions/Developpement d_un cheval de Troie - Rapport.pdf