Figure 2 Backdoor execution flow

Figure 2 Backdoor execution flow

Figure 2. Backdoor execution flow