Figure2

Figure2

Figure 2 - The digital signature of the malicious Transmission application