Figure5 | WeLiveSecurity

Figure5

Figure 5. Malicious code after deobfuscation (comments added by the researcher)