Figure 8 - Files on infected machine

Figure 8 – Files on infected machine