. "FIG. 7 is an example showing the malicious script that is decrypted through substitution of a value obtained from the execution results shown in FIG. 6." . . .