Figure5

Figure5

Figure 5 – The malicious app requesting access to emails