Figure5

Figure5

Figure 5. Malicious code after deobfuscation (comments added by the researcher)