Figure2

Figure2

Figure 2: Registry entry used by the malware to gain persistence