Figure3 | WeLiveSecurity

Figure3

Figure 3 – The malware’s execution model