Figure-4-Malicious-code-written-into-memory-locations-in-RegAsm