Figure 3 Install requests by Trojan

Figure 3 Install requests by Trojan

Figure 3: Install requests by trojan