Figure3

Figure3

Figure 3 - The decompiled code of the malicious Transmission application