This graph is an example of the infection process that takes place from the moment when a user accesses a legitimate website that has been modified until the possible infection is effective.

Thanks to Oscar and Olaiz for their collaboration.