trojan
→
CapableOf
→
run in the background
|
0.63
|
|
trojan
→
CapableOf
→
create backdoor
|
0.63
|
|
trojan
→
CapableOf
→
enter the system
|
0.57
|
|
trojan
→
CapableOf
→
steal password
|
0.56
|
|
trojan
→
CapableOf
→
create their own copies
|
0.55
|
|
trojan
→
CapableOf
→
enter the machine
|
0.54
|
|
trojan
→
CapableOf
→
send message
|
0.53
|
|
trojan
→
CapableOf
→
reinstall after partial removal
|
0.53
|
|
trojan
→
CapableOf
→
steal information
|
0.52
|
|
trojan
→
CapableOf
→
wait for command
|
0.52
|
|
trojan
→
CapableOf
→
spread through internet downloa…
|
0.52
|
|
trojan
→
CapableOf
→
send the information
|
0.50
|
|
trojan
→
CapableOf
→
introduce virus
|
0.50
|
|
trojan
→
CapableOf
→
encrypt file
|
0.49
|
|
trojan
→
CapableOf
→
rely on people
|
0.49
|
|
trojan
→
CapableOf
→
perform desirable function
|
0.48
|
|
trojan
→
CapableOf
→
locate the system folder
|
0.48
|
|
trojan
→
CapableOf
→
log keystroke
|
0.48
|
|
trojan
→
CapableOf
→
spread through email attachments
|
0.47
|
|
trojan
→
CapableOf
→
steal datum
|
0.47
|
|
trojan
→
CapableOf
→
execute file
|
0.47
|
|
trojan
→
CapableOf
→
resisting deletion
|
0.47
|
|
trojan
→
CapableOf
→
steal sensitive data
|
0.46
|
|
trojan
→
CapableOf
→
download additional malware
|
0.45
|
|
trojan
→
CapableOf
→
gain access
|
0.44
|
|
trojan
→
CapableOf
→
give access
|
0.43
|
|
trojan
→
CapableOf
→
connect to remote server
|
0.43
|
|
trojan
→
CapableOf
→
resist removal
|
0.43
|
|
trojan
→
CapableOf
→
act as backdoor
|
0.43
|
|
trojan
→
CapableOf
→
share similar characteristics
|
0.42
|
|
trojan
→
CapableOf
→
inject malicious code
|
0.42
|
|
trojan
→
CapableOf
→
recover after partial removal
|
0.42
|
|
trojan
→
CapableOf
→
make their backups
|
0.42
|
|
trojan
→
CapableOf
→
collect datum
|
0.40
|
|
trojan
→
CapableOf
→
share orbit
|
0.39
|
|
trojan
→
CapableOf
→
delete file
|
0.39
|
|
trojan
→
CapableOf
→
steal financial data
|
0.38
|
|
trojan
→
CapableOf
→
run command
|
0.38
|
|
trojan
→
CapableOf
→
download additional files
|
0.38
|
|
trojan
→
CapableOf
→
masquerade as helpful program
|
0.37
|
|
trojan
→
CapableOf
→
resist elimination
|
0.36
|
|
trojan
→
CapableOf
→
install via online games
|
0.36
|
|
trojan
→
CapableOf
→
scan the system
|
0.36
|
|
trojan
→
CapableOf
→
corrupt system files
|
0.34
|
|
trojan
→
CapableOf
→
install keylogger
|
0.34
|
|
trojan
→
CapableOf
→
give information
|
0.34
|
|
trojan
→
CapableOf
→
hit the fan
|
0.34
|
|
trojan
→
CapableOf
→
install the mining software
|
0.34
|
|
trojan
→
CapableOf
→
perform unexpected or unauthori…
|
0.34
|
|
trojan
→
CapableOf
→
defeat the green wave
|
0.32
|
|
trojan
→
CapableOf
→
dished out double-figure assists
|
0.32
|
|
trojan
→
CapableOf
→
encrypt datum
|
0.32
|
|
trojan
→
CapableOf
→
use drive
|
0.32
|
|
trojan
→
CapableOf
→
open back door
|
0.29
|
|
trojan
→
CapableOf
→
defeat the railroaders
|
0.29
|
|
trojan
→
CapableOf
→
install via internet-driven app…
|
0.29
|
|
trojan
→
CapableOf
→
lead the pac-12
|
0.29
|
|
trojan
→
CapableOf
→
lead the series
|
0.29
|
|
trojan
→
CapableOf
→
made four trips
|
0.29
|
|
trojan
→
CapableOf
→
occur in february
|
0.29
|
|
trojan
→
CapableOf
→
score four runs
|
0.29
|
|
trojan
→
CapableOf
→
take the lead
|
0.29
|
|
trojan
→
CapableOf
→
use the accessibility service
|
0.29
|
|
trojan
→
CapableOf
→
win their 12th cws title
|
0.29
|
|
trojan
→
CapableOf
→
compromise the security of syst…
|
0.27
|
|
trojan
→
CapableOf
→
modify datum
|
0.27
|
|
trojan
→
CapableOf
→
run on fake site
|
0.27
|
|
trojan
→
CapableOf
→
steal money
|
0.27
|
|
trojan
→
CapableOf
→
attempt to obtain damage
|
0.25
|
|
trojan
→
CapableOf
→
collect various sensitive infor…
|
0.25
|
|
trojan
→
CapableOf
→
destroy datum
|
0.25
|
|
trojan
→
CapableOf
→
drop malicious payload
|
0.25
|
|
trojan
→
CapableOf
→
get installed into the victim’s…
|
0.25
|
|
trojan
→
CapableOf
→
redirect user
|
0.25
|
|
trojan
→
CapableOf
→
use rootkit
|
0.25
|
|
trojan
→
CapableOf
→
connected on at least five 3-po…
|
0.25
|
|
trojan
→
CapableOf
→
defeat marshfield
|
0.25
|
|
trojan
→
CapableOf
→
download the nohup utility
|
0.25
|
|
trojan
→
CapableOf
→
download updated copy of itself
|
0.25
|
|
trojan
→
CapableOf
→
encrypt a maximum of 0x500000 b…
|
0.25
|
|
trojan
→
CapableOf
→
fight at the rear of our ships
|
0.25
|
|
trojan
→
CapableOf
→
give update
|
0.25
|
|
trojan
→
CapableOf
→
go into the locker room
|
0.25
|
|
trojan
→
CapableOf
→
hide in download
|
0.25
|
|
trojan
→
CapableOf
→
hide in email
|
0.25
|
|
trojan
→
CapableOf
→
login to the wordpress admin pa…
|
0.25
|
|
trojan
→
CapableOf
→
make moan
|
0.25
|
|
trojan
→
CapableOf
→
make modification
|
0.25
|
|
trojan
→
CapableOf
→
notify the hacker
|
0.25
|
|
trojan
→
CapableOf
→
open the file
|
0.25
|
|
trojan
→
CapableOf
→
operate with increased privileg…
|
0.25
|
|
trojan
→
CapableOf
→
receive uploads of arbitrary pr…
|
0.25
|
|
trojan
→
CapableOf
→
remain dormant
|
0.25
|
|
trojan
→
CapableOf
→
run the ball
|
0.25
|
|
trojan
→
CapableOf
→
search in different searching e…
|
0.25
|
|
trojan
→
CapableOf
→
use same file name
|
0.25
|
|
trojan
→
CapableOf
→
masquerade as legitimate file
|
0.23
|
|
trojan
→
CapableOf
→
exploit flaw
|
0.21
|
|
trojan
→
CapableOf
→
infect user
|
0.20
|
|
trojan
→
CapableOf
→
make superior products
|
0.20
|
|
trojan
→
CapableOf
→
perform a variety of actions
|
0.20
|
|
trojan
→
CapableOf
→
perform action
|
0.20
|
|
trojan
→
CapableOf
→
steal banking credentials
|
0.20
|
|
trojan
→
CapableOf
→
use computing power of a device
|
0.20
|
|
trojan
→
CapableOf
→
wreak havoc
|
0.20
|
|
trojan
→
CapableOf
→
remain undetected
|
0.19
|
|
trojan
→
CapableOf
→
be a computer threat
|
0.16
|
|
trojan
→
CapableOf
→
bring the horse
|
0.16
|
|
trojan
→
CapableOf
→
bypass the firewall
|
0.16
|
|
trojan
→
CapableOf
→
create iframe
|
0.16
|
|
trojan
→
CapableOf
→
destroy file
|
0.16
|
|
trojan
→
CapableOf
→
display an error message
|
0.16
|
|
trojan
→
CapableOf
→
do same thing
|
0.16
|
|
trojan
→
CapableOf
→
download many other types of ma…
|
0.16
|
|
trojan
→
CapableOf
→
expropriate personal information
|
0.16
|
|
trojan
→
CapableOf
→
increase the number of total in…
|
0.16
|
|
trojan
→
CapableOf
→
inject dll
|
0.16
|
|
trojan
→
CapableOf
→
install ransomware
|
0.16
|
|
trojan
→
CapableOf
→
keep sending the victims data
|
0.16
|
|
trojan
→
CapableOf
→
lead the sun belt
|
0.16
|
|
trojan
→
CapableOf
→
make headline
|
0.16
|
|
trojan
→
CapableOf
→
pose direct threat
|
0.16
|
|
trojan
→
CapableOf
→
proliferate ransomware
|
0.16
|
|
trojan
→
CapableOf
→
remain unbeaten
|
0.16
|
|
trojan
→
CapableOf
→
show their class
|
0.16
|
|
trojan
→
CapableOf
→
show up for helton
|
0.16
|
|
trojan
→
CapableOf
→
simulate tap
|
0.16
|
|
trojan
→
CapableOf
→
spread like wildfire
|
0.16
|
|
trojan
→
CapableOf
→
steal file
|
0.16
|
|
trojan
→
CapableOf
→
steal username
|
0.16
|
|
trojan
→
CapableOf
→
understand the need
|
0.16
|
|
trojan
→
CapableOf
→
use bundlingmethod
|
0.16
|
|
trojan
→
CapableOf
→
use social engineering
|
0.16
|
|