Figure 3 - Install requests by Trojan

Figure 3 – Install requests by Trojan

Figure 3: Install requests by trojan