Assertion list
trojan (primary) → CapableOf

Results from Ascent++: 133
trojanCapableOf run in the background 0.63
trojanCapableOf create backdoor 0.63
trojanCapableOf enter the system 0.57
trojanCapableOf steal password 0.56
trojanCapableOf create their own copies 0.55
trojanCapableOf enter the machine 0.54
trojanCapableOf send message 0.53
trojanCapableOf reinstall after partial removal 0.53
trojanCapableOf steal information 0.52
trojanCapableOf wait for command 0.52
trojanCapableOf spread through internet downloa… 0.52
trojanCapableOf send the information 0.50
trojanCapableOf introduce virus 0.50
trojanCapableOf encrypt file 0.49
trojanCapableOf rely on people 0.49
trojanCapableOf perform desirable function 0.48
trojanCapableOf locate the system folder 0.48
trojanCapableOf log keystroke 0.48
trojanCapableOf spread through email attachments 0.47
trojanCapableOf steal datum 0.47
trojanCapableOf execute file 0.47
trojanCapableOf resisting deletion 0.47
trojanCapableOf steal sensitive data 0.46
trojanCapableOf download additional malware 0.45
trojanCapableOf gain access 0.44
trojanCapableOf give access 0.43
trojanCapableOf connect to remote server 0.43
trojanCapableOf resist removal 0.43
trojanCapableOf act as backdoor 0.43
trojanCapableOf share similar characteristics 0.42
trojanCapableOf inject malicious code 0.42
trojanCapableOf recover after partial removal 0.42
trojanCapableOf make their backups 0.42
trojanCapableOf collect datum 0.40
trojanCapableOf share orbit 0.39
trojanCapableOf delete file 0.39
trojanCapableOf steal financial data 0.38
trojanCapableOf run command 0.38
trojanCapableOf download additional files 0.38
trojanCapableOf masquerade as helpful program 0.37
trojanCapableOf resist elimination 0.36
trojanCapableOf install via online games 0.36
trojanCapableOf scan the system 0.36
trojanCapableOf corrupt system files 0.34
trojanCapableOf install keylogger 0.34
trojanCapableOf give information 0.34
trojanCapableOf hit the fan 0.34
trojanCapableOf install the mining software 0.34
trojanCapableOf perform unexpected or unauthori… 0.34
trojanCapableOf defeat the green wave 0.32
trojanCapableOf dished out double-figure assists 0.32
trojanCapableOf encrypt datum 0.32
trojanCapableOf use drive 0.32
trojanCapableOf open back door 0.29
trojanCapableOf defeat the railroaders 0.29
trojanCapableOf install via internet-driven app… 0.29
trojanCapableOf lead the pac-12 0.29
trojanCapableOf lead the series 0.29
trojanCapableOf made four trips 0.29
trojanCapableOf occur in february 0.29
trojanCapableOf score four runs 0.29
trojanCapableOf take the lead 0.29
trojanCapableOf use the accessibility service 0.29
trojanCapableOf win their 12th cws title 0.29
trojanCapableOf compromise the security of syst… 0.27
trojanCapableOf modify datum 0.27
trojanCapableOf run on fake site 0.27
trojanCapableOf steal money 0.27
trojanCapableOf attempt to obtain damage 0.25
trojanCapableOf collect various sensitive infor… 0.25
trojanCapableOf destroy datum 0.25
trojanCapableOf drop malicious payload 0.25
trojanCapableOf get installed into the victim’s… 0.25
trojanCapableOf redirect user 0.25
trojanCapableOf use rootkit 0.25
trojanCapableOf connected on at least five 3-po… 0.25
trojanCapableOf defeat marshfield 0.25
trojanCapableOf download the nohup utility 0.25
trojanCapableOf download updated copy of itself 0.25
trojanCapableOf encrypt a maximum of 0x500000 b… 0.25
trojanCapableOf fight at the rear of our ships 0.25
trojanCapableOf give update 0.25
trojanCapableOf go into the locker room 0.25
trojanCapableOf hide in download 0.25
trojanCapableOf hide in email 0.25
trojanCapableOf login to the wordpress admin pa… 0.25
trojanCapableOf make moan 0.25
trojanCapableOf make modification 0.25
trojanCapableOf notify the hacker 0.25
trojanCapableOf open the file 0.25
trojanCapableOf operate with increased privileg… 0.25
trojanCapableOf receive uploads of arbitrary pr… 0.25
trojanCapableOf remain dormant 0.25
trojanCapableOf run the ball 0.25
trojanCapableOf search in different searching e… 0.25
trojanCapableOf use same file name 0.25
trojanCapableOf masquerade as legitimate file 0.23
trojanCapableOf exploit flaw 0.21
trojanCapableOf infect user 0.20
trojanCapableOf make superior products 0.20
trojanCapableOf perform a variety of actions 0.20
trojanCapableOf perform action 0.20
trojanCapableOf steal banking credentials 0.20
trojanCapableOf use computing power of a device 0.20
trojanCapableOf wreak havoc 0.20
trojanCapableOf remain undetected 0.19
trojanCapableOf be a computer threat 0.16
trojanCapableOf bring the horse 0.16
trojanCapableOf bypass the firewall 0.16
trojanCapableOf create iframe 0.16
trojanCapableOf destroy file 0.16
trojanCapableOf display an error message 0.16
trojanCapableOf do same thing 0.16
trojanCapableOf download many other types of ma… 0.16
trojanCapableOf expropriate personal information 0.16
trojanCapableOf increase the number of total in… 0.16
trojanCapableOf inject dll 0.16
trojanCapableOf install ransomware 0.16
trojanCapableOf keep sending the victims data 0.16
trojanCapableOf lead the sun belt 0.16
trojanCapableOf make headline 0.16
trojanCapableOf pose direct threat 0.16
trojanCapableOf proliferate ransomware 0.16
trojanCapableOf remain unbeaten 0.16
trojanCapableOf show their class 0.16
trojanCapableOf show up for helton 0.16
trojanCapableOf simulate tap 0.16
trojanCapableOf spread like wildfire 0.16
trojanCapableOf steal file 0.16
trojanCapableOf steal username 0.16
trojanCapableOf understand the need 0.16
trojanCapableOf use bundlingmethod 0.16
trojanCapableOf use social engineering 0.16