If the exploit works, then the payload is downloaded and decrypted by the shellcode, using the aforementioned key. Angler uses different keys according to the exploitation path (Internet Explorer, Flash, Silverlight – at least two keys for each are currently known). After decrypting the payload, the shellcode checks the header to identify if the payload is yet more shellcode (which starts with do-