Figure2 | WeLiveSecurity

Figure2

Figure 2: Registry entry used by the malware to gain persistence