Figure 4: Example of a decoded stream content of a malicious PDF file.