malware analysis…

“do hook / hook install / … / payload2 / a / b / … / sc1 / child / child2 / payload3 entry /…”

@williballenthin