Figure6 | WeLiveSecurity

Figure6

Figure 6: Delphi backdoor plaintext configuration data