trojan
→
IsA
→
program
|
0.72
|
|
trojan
→
IsA
→
malicious programs
|
0.68
|
|
trojan
→
CapableOf
→
run in the background
|
0.63
|
|
trojan
→
CapableOf
→
create backdoor
|
0.63
|
|
trojan
→
HasProperty
→
dangerous
|
0.62
|
|
trojan
→
CapableOf
→
enter the system
|
0.57
|
|
trojan
→
ReceivesAction
→
distributed
|
0.57
|
|
trojan
→
CapableOf
→
steal password
|
0.56
|
|
trojan
→
ReceivesAction
→
installed
|
0.56
|
|
trojan
→
ReceivesAction
→
employed by hacker
|
0.56
|
|
trojan
→
CapableOf
→
create their own copies
|
0.55
|
|
trojan
→
CapableOf
→
enter the machine
|
0.54
|
|
trojan
→
CapableOf
→
send message
|
0.53
|
|
trojan
→
CapableOf
→
reinstall after partial removal
|
0.53
|
|
trojan
→
CapableOf
→
steal information
|
0.52
|
|
trojan
→
CapableOf
→
wait for command
|
0.52
|
|
trojan
→
CapableOf
→
spread through internet downloads
|
0.52
|
|
trojan
→
ReceivesAction
→
hidden
|
0.51
|
|
trojan
→
CapableOf
→
send the information
|
0.50
|
|
trojan
→
CapableOf
→
introduce virus
|
0.50
|
|
trojan
→
CapableOf
→
encrypt file
|
0.49
|
|
trojan
→
CapableOf
→
rely on people
|
0.49
|
|
trojan
→
CapableOf
→
perform desirable function
|
0.48
|
|
trojan
→
CapableOf
→
locate the system folder
|
0.48
|
|
trojan
→
CapableOf
→
log keystroke
|
0.48
|
|
trojan
→
CapableOf
→
spread through email attachments
|
0.47
|
|
trojan
→
ReceivesAction
→
detected
|
0.47
|
|
trojan
→
CapableOf
→
steal datum
|
0.47
|
|
trojan
→
CapableOf
→
execute file
|
0.47
|
|
trojan
→
CapableOf
→
resisting deletion
|
0.47
|
|
trojan
→
ReceivesAction
→
supported
|
0.47
|
|
trojan
→
CapableOf
→
steal sensitive data
|
0.46
|
|
trojan
→
CapableOf
→
download additional malware
|
0.45
|
|
trojan
→
HasProperty
→
versatile
|
0.45
|
|
trojan
→
ReceivesAction
→
removed
|
0.44
|
|
trojan
→
CapableOf
→
gain access
|
0.44
|
|
trojan
→
ReceivesAction
→
employed by cyber-thieves
|
0.43
|
|
trojan
→
CapableOf
→
give access
|
0.43
|
|
trojan
→
CapableOf
→
resist removal
|
0.43
|
|
trojan
→
CapableOf
→
connect to remote server
|
0.43
|
|
trojan
→
CapableOf
→
act as backdoor
|
0.43
|
|
trojan
→
CapableOf
→
share similar characteristics
|
0.42
|
|
trojan
→
CapableOf
→
recover after partial removal
|
0.42
|
|
trojan
→
ReceivesAction
→
known for their multitasking
|
0.42
|
|
trojan
→
CapableOf
→
inject malicious code
|
0.42
|
|
trojan
→
CapableOf
→
make their backups
|
0.42
|
|
trojan
→
ReceivesAction
→
recognized
|
0.41
|
|
trojan
→
ReceivesAction
→
hidden within another program
|
0.41
|
|
trojan
→
ReceivesAction
→
known for stealthiness
|
0.40
|
|
trojan
→
CapableOf
→
collect datum
|
0.40
|
|
trojan
→
HasProperty
→
legitimate
|
0.40
|
|
trojan
→
ReceivesAction
→
disguised as legitimate software
|
0.40
|
|
trojan
→
ReceivesAction
→
discovered
|
0.39
|
|
trojan
→
CapableOf
→
share orbit
|
0.39
|
|
trojan
→
CapableOf
→
delete file
|
0.39
|
|
trojan
→
CapableOf
→
steal financial data
|
0.38
|
|
trojan
→
CapableOf
→
run command
|
0.38
|
|
trojan
→
HasPrerequisite
→
the user
|
0.38
|
|
trojan
→
ReceivesAction
→
maintained
|
0.38
|
|
trojan
→
HasProperty
→
second
|
0.38
|
|
trojan
→
ReceivesAction
→
posted
|
0.38
|
|
trojan
→
CapableOf
→
download additional files
|
0.38
|
|
trojan
→
DefinedAs
→
their multitasking
|
0.38
|
|
trojan
→
CapableOf
→
masquerade as helpful program
|
0.37
|
|
trojan
→
DefinedAs
→
their high efficiency
|
0.36
|
|
trojan
→
CapableOf
→
resist elimination
|
0.36
|
|
trojan
→
CapableOf
→
install via online games
|
0.36
|
|
trojan
→
CapableOf
→
scan the system
|
0.36
|
|
trojan
→
Causes
→
damage
|
0.35
|
|
trojan
→
ReceivesAction
→
difficult to detect
|
0.35
|
|
trojan
→
HasA
→
one significant weakness
|
0.34
|
|
trojan
→
ReceivesAction
→
created
|
0.34
|
|
trojan
→
CapableOf
→
install keylogger
|
0.34
|
|
trojan
→
CapableOf
→
corrupt system files
|
0.34
|
|
trojan
→
ReceivesAction
→
launched
|
0.34
|
|
trojan
→
ReceivesAction
→
stopped
|
0.34
|
|
trojan
→
HasProperty
→
third
|
0.34
|
|
trojan
→
CapableOf
→
hit the fan
|
0.34
|
|
trojan
→
CapableOf
→
give information
|
0.34
|
|
trojan
→
ReceivesAction
→
tested
|
0.34
|
|
trojan
→
ReceivesAction
→
started
|
0.34
|
|
trojan
→
CapableOf
→
install the mining software
|
0.34
|
|
trojan
→
CapableOf
→
perform unexpected or unauthorized, malicious, actions
|
0.34
|
|
trojan
→
ReceivesAction
→
placed
|
0.33
|
|
trojan
→
HasProperty
→
destructive
|
0.32
|
|
trojan
→
ReceivesAction
→
designed to be more annoying
|
0.32
|
|
trojan
→
CapableOf
→
use drive
|
0.32
|
|
trojan
→
CapableOf
→
encrypt datum
|
0.32
|
|
trojan
→
HasA
→
a .500 or better record
|
0.32
|
|
trojan
→
CapableOf
→
dished out double-figure assists
|
0.32
|
|
trojan
→
CapableOf
→
defeat the green wave
|
0.32
|
|
trojan
→
AtLocation
→
the actionstab
|
0.32
|
|
attachment
→
HasA
→
trojan
|
0.31
|
|
trojan
→
HasProperty
→
popular
|
0.31
|
|
trojan
→
ReceivesAction
→
followed by worm
|
0.31
|
|
trojan
→
ReceivesAction
→
distributed via fake online scanners
|
0.29
|
|
trojan
→
CapableOf
→
open back door
|
0.29
|
|
trojan
→
ReceivesAction
→
exploited
|
0.29
|
|
trojan
→
CapableOf
→
install via internet-driven applications
|
0.29
|
|
trojan
→
CapableOf
→
score four runs
|
0.29
|
|
trojan
→
CapableOf
→
use the accessibility service
|
0.29
|
|
trojan
→
ReceivesAction
→
executed on compromised computer
|
0.29
|
|
trojan
→
CapableOf
→
made four trips
|
0.29
|
|
trojan
→
CapableOf
→
win their 12th cws title
|
0.29
|
|
trojan
→
ReceivesAction
→
written in c++
|
0.29
|
|
trojan
→
ReceivesAction
→
written
|
0.29
|
|
trojan
→
CapableOf
→
take the lead
|
0.29
|
|
trojan
→
CapableOf
→
occur in february
|
0.29
|
|
trojan
→
CapableOf
→
lead the series
|
0.29
|
|
trojan
→
ReceivesAction
→
attached to free game
|
0.29
|
|
trojan
→
ReceivesAction
→
attached to other utility
|
0.29
|
|
trojan
→
CapableOf
→
lead the pac-12
|
0.29
|
|
trojan
→
HasProperty
→
advanced
|
0.29
|
|
trojan
→
CapableOf
→
defeat the railroaders
|
0.29
|
|
trojan
→
CapableOf
→
run on fake site
|
0.27
|
|
trojan
→
HasProperty
→
accurate
|
0.27
|
|
trojan
→
HasA
→
extra negatives
|
0.27
|
|
trojan
→
CapableOf
→
compromise the security of systems
|
0.27
|
|
trojan
→
HasA
→
multiple side effects
|
0.27
|
|
trojan
→
CapableOf
→
steal money
|
0.27
|
|
trojan
→
CapableOf
→
modify datum
|
0.27
|
|
trojan
→
ReceivesAction
→
used by swindler
|
0.27
|
|
copyright
→
HasA
→
trojan
|
0.26
|
|
trojan
→
CapableOf
→
get installed into the victim’s system
|
0.25
|
|
trojan
→
CapableOf
→
redirect user
|
0.25
|
|
trojan
→
CapableOf
→
drop malicious payload
|
0.25
|
|
trojan
→
CapableOf
→
use rootkit
|
0.25
|
|
trojan
→
CapableOf
→
collect various sensitive information
|
0.25
|
|
trojan
→
CapableOf
→
attempt to obtain damage
|
0.25
|
|
trojan
→
CapableOf
→
destroy datum
|
0.25
|
|
trojan
→
HasProperty
→
careful
|
0.25
|
|
trojan
→
CapableOf
→
operate with increased privileges
|
0.25
|
|
trojan
→
HasA
→
a list of 4urls
|
0.25
|
|
trojan
→
CapableOf
→
download the nohup utility
|
0.25
|
|
trojan
→
HasA
→
firm grasp
|
0.25
|
|
trojan
→
ReceivesAction
→
impossible to reveal
|
0.25
|
|
trojan
→
ReceivesAction
→
detected by trend micro
|
0.25
|
|
trojan
→
CapableOf
→
go into the locker room
|
0.25
|
|
trojan
→
CapableOf
→
remain dormant
|
0.25
|
|
trojan
→
CapableOf
→
defeat marshfield
|
0.25
|
|
trojan
→
ReceivesAction
→
formed beyond jupiter’s current orbit
|
0.25
|
|
trojan
→
CapableOf
→
receive uploads of arbitrary programs
|
0.25
|
|
trojan
→
CapableOf
→
connected on at least five 3-pointers
|
0.25
|
|
trojan
→
ReceivesAction
→
driven
|
0.25
|
|
trojan
→
ReceivesAction
→
packed with upx
|
0.25
|
|
trojan
→
CapableOf
→
notify the hacker
|
0.25
|
|
trojan
→
CapableOf
→
use same file name
|
0.25
|
|
trojan
→
CapableOf
→
give update
|
0.25
|
|
trojan
→
CapableOf
→
encrypt a maximum of 0x500000 bytes
|
0.25
|
|
trojan
→
CapableOf
→
fight at the rear of our ships
|
0.25
|
|
trojan
→
CapableOf
→
make moan
|
0.25
|
|
trojan
→
HasProperty
→
ninth
|
0.25
|
|
trojan
→
CapableOf
→
run the ball
|
0.25
|
|
trojan
→
CapableOf
→
open the file
|
0.25
|
|
trojan
→
ReceivesAction
→
used in conjunction
|
0.25
|
|
trojan
→
ReceivesAction
→
discovered at the l5 point
|
0.25
|
|
trojan
→
CapableOf
→
make modification
|
0.25
|
|
trojan
→
CapableOf
→
hide in email
|
0.25
|
|
trojan
→
CapableOf
→
hide in download
|
0.25
|
|
trojan
→
CapableOf
→
download updated copy of itself
|
0.25
|
|
trojan
→
HasA
→
4 known modules
|
0.25
|
|
trojan
→
CapableOf
→
search in different searching engines
|
0.25
|
|
trojan
→
CapableOf
→
login to the wordpress admin panels
|
0.25
|
|
trojan
→
CapableOf
→
masquerade as legitimate file
|
0.23
|
|
trojan
→
ReceivesAction
→
spread by some form of social engineering
|
0.23
|
|
trojan
→
ReceivesAction
→
compared to parasite
|
0.23
|
|
trojan
→
ReceivesAction
→
known for usability
|
0.23
|
|
trojan
→
CapableOf
→
exploit flaw
|
0.21
|
|
trojan
→
CapableOf
→
steal banking credentials
|
0.20
|
|
trojan
→
ReceivesAction
→
known for their high effectiveness
|
0.20
|
|
trojan
→
HasA
→
multiple side negatives
|
0.20
|
|
trojan
→
CapableOf
→
perform action
|
0.20
|
|
trojan
→
IsA
→
non-self-replicating type of malware
|
0.20
|
|
trojan
→
CapableOf
→
wreak havoc
|
0.20
|
|
trojan
→
ReceivesAction
→
disguised as game
|
0.20
|
|
trojan
→
CapableOf
→
infect user
|
0.20
|
|
trojan
→
CapableOf
→
use computing power of a device
|
0.20
|
|
trojan
→
CapableOf
→
perform a variety of actions
|
0.20
|
|
trojan
→
HasProperty
→
successful
|
0.20
|
|
trojan
→
CapableOf
→
make superior products
|
0.20
|
|
trojan
→
CapableOf
→
remain undetected
|
0.19
|
|
archive
→
HasSubevent
→
trojan
|
0.19
|
|
trojan
→
CapableOf
→
keep sending the victims data
|
0.16
|
|
trojan
→
CapableOf
→
download many other types of malware
|
0.16
|
|
trojan
→
HasProperty
→
strong
|
0.16
|
|
trojan
→
ReceivesAction
→
placed into heavy rotation
|
0.16
|
|
trojan
→
ReceivesAction
→
advised of the possibility of such damages
|
0.16
|
|
trojan
→
CapableOf
→
spread like wildfire
|
0.16
|
|
trojan
→
CapableOf
→
pose direct threat
|
0.16
|
|
trojan
→
CapableOf
→
simulate tap
|
0.16
|
|
trojan
→
CapableOf
→
increase the number of total installs
|
0.16
|
|
trojan
→
MotivatedByGoal
→
the plant
|
0.16
|
|
trojan
→
CapableOf
→
understand the need
|
0.16
|
|
trojan
→
CapableOf
→
be a computer threat
|
0.16
|
|
trojan
→
CapableOf
→
destroy file
|
0.16
|
|
trojan
→
CapableOf
→
display an error message
|
0.16
|
|
trojan
→
HasProperty
→
inconsistent
|
0.16
|
|
trojan
→
HasProperty
→
undetectable
|
0.16
|
|
trojan
→
ReceivesAction
→
used as tool
|
0.16
|
|
trojan
→
CapableOf
→
show their class
|
0.16
|
|
trojan
→
HasProperty
→
simple
|
0.16
|
|
trojan
→
ReceivesAction
→
disguised as a screen saver
|
0.16
|
|
trojan
→
ReceivesAction
→
unable to penetrate victim's computer
|
0.16
|
|
trojan
→
CapableOf
→
inject dll
|
0.16
|
|
trojan
→
CapableOf
→
show up for helton
|
0.16
|
|
trojan
→
ReceivesAction
→
undone by turnover
|
0.16
|
|
trojan
→
ReceivesAction
→
undone by penalty
|
0.16
|
|
trojan
→
ReceivesAction
→
undone by poor play
|
0.16
|
|
trojan
→
CapableOf
→
bring the horse
|
0.16
|
|
trojan
→
CapableOf
→
proliferate ransomware
|
0.16
|
|
trojan
→
ReceivesAction
→
known for secrecy
|
0.16
|
|
trojan
→
CapableOf
→
expropriate personal information
|
0.16
|
|
trojan
→
HasProperty
→
good
|
0.16
|
|
trojan
→
CapableOf
→
steal username
|
0.16
|
|
trojan
→
CapableOf
→
make headline
|
0.16
|
|
trojan
→
AtLocation
→
knitting manuals
|
0.16
|
|
trojan
→
CapableOf
→
install ransomware
|
0.16
|
|
trojan
→
CapableOf
→
steal file
|
0.16
|
|
trojan
→
CapableOf
→
use bundlingmethod
|
0.16
|
|
trojan
→
CapableOf
→
create iframe
|
0.16
|
|
trojan
→
CapableOf
→
use social engineering
|
0.16
|
|
trojan
→
CapableOf
→
lead the sun belt
|
0.16
|
|
trojan
→
CapableOf
→
remain unbeaten
|
0.16
|
|
trojan
→
ReceivesAction
→
caught
|
0.16
|
|
trojan
→
HasProperty
→
busy
|
0.16
|
|
trojan
→
CapableOf
→
do same thing
|
0.16
|
|
trojan
→
CapableOf
→
bypass the firewall
|
0.16
|
|
trojan
→
HasA
→
self-replicating virus-like capabilities
|
0.16
|
|