 So in a previous video, we de-obfuscated the strings of a malicious VBA document, and those strings contained a lot of extra characters. And when you removed those characters, you ended up with the actual command. So this was the sample with the VBA macros. And if we select and decompress all the VBA macros, we can see the obfuscated strings, like this one here. And if you take a closer look, like I explained, you see cmd.exe here. So manually we removed all those superfluous characters so that we could recover the actual commands. But now to do this easy, I have a plugin to do that. P4 plugin. The plugin is strings up. You give it a sample, and then it will print out all the strings. It will still contain obfuscated strings, but here you can see the obfuscated strings with the actual commands, like we saw in the other video.