Figure2

Figure2

Figure 2: Zebrocy’s malicious documents