install-requests | WeLiveSecurity

install-requests

Figure 3: Install requests by trojan