trojan
→
ReceivesAction
→
distributed
|
0.57
|
|
trojan
→
ReceivesAction
→
installed
|
0.56
|
|
trojan
→
ReceivesAction
→
employed by hacker
|
0.56
|
|
trojan
→
ReceivesAction
→
hidden
|
0.51
|
|
trojan
→
ReceivesAction
→
detected
|
0.47
|
|
trojan
→
ReceivesAction
→
supported
|
0.47
|
|
trojan
→
ReceivesAction
→
removed
|
0.44
|
|
trojan
→
ReceivesAction
→
employed by cyber-thieves
|
0.43
|
|
trojan
→
ReceivesAction
→
known for their multitasking
|
0.42
|
|
trojan
→
ReceivesAction
→
hidden within another program
|
0.41
|
|
trojan
→
ReceivesAction
→
recognized
|
0.41
|
|
trojan
→
ReceivesAction
→
known for stealthiness
|
0.40
|
|
trojan
→
ReceivesAction
→
disguised as legitimate software
|
0.40
|
|
trojan
→
ReceivesAction
→
discovered
|
0.39
|
|
trojan
→
ReceivesAction
→
maintained
|
0.38
|
|
trojan
→
ReceivesAction
→
posted
|
0.38
|
|
trojan
→
ReceivesAction
→
difficult to detect
|
0.35
|
|
trojan
→
ReceivesAction
→
created
|
0.34
|
|
trojan
→
ReceivesAction
→
launched
|
0.34
|
|
trojan
→
ReceivesAction
→
started
|
0.34
|
|
trojan
→
ReceivesAction
→
stopped
|
0.34
|
|
trojan
→
ReceivesAction
→
tested
|
0.34
|
|
trojan
→
ReceivesAction
→
placed
|
0.33
|
|
trojan
→
ReceivesAction
→
designed to be more annoying
|
0.32
|
|
trojan
→
ReceivesAction
→
followed by worm
|
0.31
|
|
trojan
→
ReceivesAction
→
distributed via fake online sca…
|
0.29
|
|
trojan
→
ReceivesAction
→
exploited
|
0.29
|
|
trojan
→
ReceivesAction
→
attached to free game
|
0.29
|
|
trojan
→
ReceivesAction
→
attached to other utility
|
0.29
|
|
trojan
→
ReceivesAction
→
executed on compromised computer
|
0.29
|
|
trojan
→
ReceivesAction
→
written
|
0.29
|
|
trojan
→
ReceivesAction
→
written in c++
|
0.29
|
|
trojan
→
ReceivesAction
→
used by swindler
|
0.27
|
|
trojan
→
ReceivesAction
→
detected by trend micro
|
0.25
|
|
trojan
→
ReceivesAction
→
discovered at the l5 point
|
0.25
|
|
trojan
→
ReceivesAction
→
driven
|
0.25
|
|
trojan
→
ReceivesAction
→
formed beyond jupiter’s current…
|
0.25
|
|
trojan
→
ReceivesAction
→
impossible to reveal
|
0.25
|
|
trojan
→
ReceivesAction
→
packed with upx
|
0.25
|
|
trojan
→
ReceivesAction
→
used in conjunction
|
0.25
|
|
trojan
→
ReceivesAction
→
compared to parasite
|
0.23
|
|
trojan
→
ReceivesAction
→
known for usability
|
0.23
|
|
trojan
→
ReceivesAction
→
spread by some form of social e…
|
0.23
|
|
trojan
→
ReceivesAction
→
disguised as game
|
0.20
|
|
trojan
→
ReceivesAction
→
known for their high effectiven…
|
0.20
|
|
trojan
→
ReceivesAction
→
advised of the possibility of s…
|
0.16
|
|
trojan
→
ReceivesAction
→
caught
|
0.16
|
|
trojan
→
ReceivesAction
→
disguised as a screen saver
|
0.16
|
|
trojan
→
ReceivesAction
→
known for secrecy
|
0.16
|
|
trojan
→
ReceivesAction
→
placed into heavy rotation
|
0.16
|
|
trojan
→
ReceivesAction
→
unable to penetrate victim's co…
|
0.16
|
|
trojan
→
ReceivesAction
→
undone by penalty
|
0.16
|
|
trojan
→
ReceivesAction
→
undone by poor play
|
0.16
|
|
trojan
→
ReceivesAction
→
undone by turnover
|
0.16
|
|
trojan
→
ReceivesAction
→
used as tool
|
0.16
|
|