Figure6

Figure6

Figure 6: Delphi backdoor plaintext configuration data