Figure 10

Figure 10

Figure 10: Malware sending initial information