Figure 6

Figure 6: Using the Redline Strings output to look for additional evidence of malware.