Figure 7 : Screenshot of njRAT working, and accessing the victim’s files.