Figure-3.-The-malicious-DLL-file