Source: https://repo.zenk-security.com/Virus-Infections-Detections-Preventions/Developpement%20d_un%20cheval%20de%20Troie%20-%20Rapport.pdf