Figure7 | WeLiveSecurity

Figure7

Figure 7: Delphi backdoor encoded configuration data