Figure5

Figure5

Figure 5 – Fake digital signature used by the malicious loader