Figure 3: Example of a stream object in a malicious PDF file.