Figure7

Figure7

Figure 7: Delphi backdoor encoded configuration data