This video demonstrates how to make running an executable less suspicious for the victim. Driving home the point that one should not run programs that you can't verify the source of.

Loading more stuff…

Hmm…it looks like things are taking a while to load. Try again?

Loading videos…