Figure 5: Another example of a stream object in a malicious PDF file.