Figure3

Figure3

Figure 3 – The malware’s execution model