Assertion list for term "trojan".

Results from Ascent++: 228
trojan IsAprogram 0.72
trojan IsAmalicious programs 0.68
trojan CapableOfrun in the background 0.63
trojan CapableOfcreate backdoor 0.63
trojan HasPropertydangerous 0.62
trojan CapableOfenter the system 0.57
trojan ReceivesActiondistributed 0.57
trojan CapableOfsteal password 0.56
trojan ReceivesActioninstalled 0.56
trojan ReceivesActionemployed by hacker 0.56
trojan CapableOfcreate their own copies 0.55
trojan CapableOfenter the machine 0.54
trojan CapableOfsend message 0.53
trojan CapableOfreinstall after partial removal 0.53
trojan CapableOfsteal information 0.52
trojan CapableOfwait for command 0.52
trojan CapableOfspread through internet downloads 0.52
trojan ReceivesActionhidden 0.51
trojan CapableOfsend the information 0.50
trojan CapableOfintroduce virus 0.50
trojan CapableOfencrypt file 0.49
trojan CapableOfrely on people 0.49
trojan CapableOfperform desirable function 0.48
trojan CapableOflocate the system folder 0.48
trojan CapableOflog keystroke 0.48
trojan CapableOfspread through email attachments 0.47
trojan ReceivesActiondetected 0.47
trojan CapableOfsteal datum 0.47
trojan CapableOfexecute file 0.47
trojan CapableOfresisting deletion 0.47
trojan ReceivesActionsupported 0.47
trojan CapableOfsteal sensitive data 0.46
trojan CapableOfdownload additional malware 0.45
trojan HasPropertyversatile 0.45
trojan ReceivesActionremoved 0.44
trojan CapableOfgain access 0.44
trojan ReceivesActionemployed by cyber-thieves 0.43
trojan CapableOfgive access 0.43
trojan CapableOfresist removal 0.43
trojan CapableOfconnect to remote server 0.43
trojan CapableOfact as backdoor 0.43
trojan CapableOfshare similar characteristics 0.42
trojan CapableOfrecover after partial removal 0.42
trojan ReceivesActionknown for their multitasking 0.42
trojan CapableOfinject malicious code 0.42
trojan CapableOfmake their backups 0.42
trojan ReceivesActionrecognized 0.41
trojan ReceivesActionhidden within another program 0.41
trojan ReceivesActionknown for stealthiness 0.40
trojan CapableOfcollect datum 0.40
trojan HasPropertylegitimate 0.40
trojan ReceivesActiondisguised as legitimate software 0.40
trojan ReceivesActiondiscovered 0.39
trojan CapableOfshare orbit 0.39
trojan CapableOfdelete file 0.39
trojan CapableOfsteal financial data 0.38
trojan CapableOfrun command 0.38
trojan HasPrerequisitethe user 0.38
trojan ReceivesActionmaintained 0.38
trojan HasPropertysecond 0.38
trojan ReceivesActionposted 0.38
trojan CapableOfdownload additional files 0.38
trojan DefinedAstheir multitasking 0.38
trojan CapableOfmasquerade as helpful program 0.37
trojan DefinedAstheir high efficiency 0.36
trojan CapableOfresist elimination 0.36
trojan CapableOfinstall via online games 0.36
trojan CapableOfscan the system 0.36
trojan Causesdamage 0.35
trojan ReceivesActiondifficult to detect 0.35
trojan HasAone significant weakness 0.34
trojan ReceivesActioncreated 0.34
trojan CapableOfinstall keylogger 0.34
trojan CapableOfcorrupt system files 0.34
trojan ReceivesActionlaunched 0.34
trojan ReceivesActionstopped 0.34
trojan HasPropertythird 0.34
trojan CapableOfhit the fan 0.34
trojan CapableOfgive information 0.34
trojan ReceivesActiontested 0.34
trojan ReceivesActionstarted 0.34
trojan CapableOfinstall the mining software 0.34
trojan CapableOfperform unexpected or unauthorized, malicious, actions 0.34
trojan ReceivesActionplaced 0.33
trojan HasPropertydestructive 0.32
trojan ReceivesActiondesigned to be more annoying 0.32
trojan CapableOfuse drive 0.32
trojan CapableOfencrypt datum 0.32
trojan HasAa .500 or better record 0.32
trojan CapableOfdished out double-figure assists 0.32
trojan CapableOfdefeat the green wave 0.32
trojan AtLocationthe actionstab 0.32
attachment HasAtrojan 0.31
trojan HasPropertypopular 0.31
trojan ReceivesActionfollowed by worm 0.31
trojan ReceivesActiondistributed via fake online scanners 0.29
trojan CapableOfopen back door 0.29
trojan ReceivesActionexploited 0.29
trojan CapableOfinstall via internet-driven applications 0.29
trojan CapableOfscore four runs 0.29
trojan CapableOfuse the accessibility service 0.29
trojan ReceivesActionexecuted on compromised computer 0.29
trojan CapableOfmade four trips 0.29
trojan CapableOfwin their 12th cws title 0.29
trojan ReceivesActionwritten in c++ 0.29
trojan ReceivesActionwritten 0.29
trojan CapableOftake the lead 0.29
trojan CapableOfoccur in february 0.29
trojan CapableOflead the series 0.29
trojan ReceivesActionattached to free game 0.29
trojan ReceivesActionattached to other utility 0.29
trojan CapableOflead the pac-12 0.29
trojan HasPropertyadvanced 0.29
trojan CapableOfdefeat the railroaders 0.29
trojan CapableOfrun on fake site 0.27
trojan HasPropertyaccurate 0.27
trojan HasAextra negatives 0.27
trojan CapableOfcompromise the security of systems 0.27
trojan HasAmultiple side effects 0.27
trojan CapableOfsteal money 0.27
trojan CapableOfmodify datum 0.27
trojan ReceivesActionused by swindler 0.27
copyright HasAtrojan 0.26
trojan CapableOfget installed into the victim’s system 0.25
trojan CapableOfredirect user 0.25
trojan CapableOfdrop malicious payload 0.25
trojan CapableOfuse rootkit 0.25
trojan CapableOfcollect various sensitive information 0.25
trojan CapableOfattempt to obtain damage 0.25
trojan CapableOfdestroy datum 0.25
trojan HasPropertycareful 0.25
trojan CapableOfoperate with increased privileges 0.25
trojan HasAa list of 4urls 0.25
trojan CapableOfdownload the nohup utility 0.25
trojan HasAfirm grasp 0.25
trojan ReceivesActionimpossible to reveal 0.25
trojan ReceivesActiondetected by trend micro 0.25
trojan CapableOfgo into the locker room 0.25
trojan CapableOfremain dormant 0.25
trojan CapableOfdefeat marshfield 0.25
trojan ReceivesActionformed beyond jupiter’s current orbit 0.25
trojan CapableOfreceive uploads of arbitrary programs 0.25
trojan CapableOfconnected on at least five 3-pointers 0.25
trojan ReceivesActiondriven 0.25
trojan ReceivesActionpacked with upx 0.25
trojan CapableOfnotify the hacker 0.25
trojan CapableOfuse same file name 0.25
trojan CapableOfgive update 0.25
trojan CapableOfencrypt a maximum of 0x500000 bytes 0.25
trojan CapableOffight at the rear of our ships 0.25
trojan CapableOfmake moan 0.25
trojan HasPropertyninth 0.25
trojan CapableOfrun the ball 0.25
trojan CapableOfopen the file 0.25
trojan ReceivesActionused in conjunction 0.25
trojan ReceivesActiondiscovered at the l5 point 0.25
trojan CapableOfmake modification 0.25
trojan CapableOfhide in email 0.25
trojan CapableOfhide in download 0.25
trojan CapableOfdownload updated copy of itself 0.25
trojan HasA4 known modules 0.25
trojan CapableOfsearch in different searching engines 0.25
trojan CapableOflogin to the wordpress admin panels 0.25
trojan CapableOfmasquerade as legitimate file 0.23
trojan ReceivesActionspread by some form of social engineering 0.23
trojan ReceivesActioncompared to parasite 0.23
trojan ReceivesActionknown for usability 0.23
trojan CapableOfexploit flaw 0.21
trojan CapableOfsteal banking credentials 0.20
trojan ReceivesActionknown for their high effectiveness 0.20
trojan HasAmultiple side negatives 0.20
trojan CapableOfperform action 0.20
trojan IsAnon-self-replicating type of malware 0.20
trojan CapableOfwreak havoc 0.20
trojan ReceivesActiondisguised as game 0.20
trojan CapableOfinfect user 0.20
trojan CapableOfuse computing power of a device 0.20
trojan CapableOfperform a variety of actions 0.20
trojan HasPropertysuccessful 0.20
trojan CapableOfmake superior products 0.20
trojan CapableOfremain undetected 0.19
archive HasSubeventtrojan 0.19
trojan CapableOfkeep sending the victims data 0.16
trojan CapableOfdownload many other types of malware 0.16
trojan HasPropertystrong 0.16
trojan ReceivesActionplaced into heavy rotation 0.16
trojan ReceivesActionadvised of the possibility of such damages 0.16
trojan CapableOfspread like wildfire 0.16
trojan CapableOfpose direct threat 0.16
trojan CapableOfsimulate tap 0.16
trojan CapableOfincrease the number of total installs 0.16
trojan MotivatedByGoalthe plant 0.16
trojan CapableOfunderstand the need 0.16
trojan CapableOfbe a computer threat 0.16
trojan CapableOfdestroy file 0.16
trojan CapableOfdisplay an error message 0.16
trojan HasPropertyinconsistent 0.16
trojan HasPropertyundetectable 0.16
trojan ReceivesActionused as tool 0.16
trojan CapableOfshow their class 0.16
trojan HasPropertysimple 0.16
trojan ReceivesActiondisguised as a screen saver 0.16
trojan ReceivesActionunable to penetrate victim's computer 0.16
trojan CapableOfinject dll 0.16
trojan CapableOfshow up for helton 0.16
trojan ReceivesActionundone by turnover 0.16
trojan ReceivesActionundone by penalty 0.16
trojan ReceivesActionundone by poor play 0.16
trojan CapableOfbring the horse 0.16
trojan CapableOfproliferate ransomware 0.16
trojan ReceivesActionknown for secrecy 0.16
trojan CapableOfexpropriate personal information 0.16
trojan HasPropertygood 0.16
trojan CapableOfsteal username 0.16
trojan CapableOfmake headline 0.16
trojan AtLocationknitting manuals 0.16
trojan CapableOfinstall ransomware 0.16
trojan CapableOfsteal file 0.16
trojan CapableOfuse bundlingmethod 0.16
trojan CapableOfcreate iframe 0.16
trojan CapableOfuse social engineering 0.16
trojan CapableOflead the sun belt 0.16
trojan CapableOfremain unbeaten 0.16
trojan ReceivesActioncaught 0.16
trojan HasPropertybusy 0.16
trojan CapableOfdo same thing 0.16
trojan CapableOfbypass the firewall 0.16
trojan HasAself-replicating virus-like capabilities 0.16