Examples of using Additional malware in English and their translations into Spanish
{-}
-
Colloquial
-
Official
AIR will connect to a remote server and download additional malware.
Gi may attempt to download additional malware from a remote server.
HEL will connect to a remote website to download additional malware.
R may download additional malware and deteriorate the performance of the system.
New Malware.y may also install additional malware onto a system.
Additional malware may also be downloaded onto a system by Backdoor. Bifrose!
Fortemp will connect to a remote server and download additional malware.
Asdg will download and execute additional malware from a remote server.
Dog may also further infect a victim's machine with additional malware.
Agent_r. XJ may also download additional malware onto an infected PC.
Xl will deteriorate a system's performance andpossibly download additional malware.
It may even download and install additional malware onto your computer.
Scan for additional malware with free software: Anti-Malware from MalwareBytes.
Zg may also make the system vulnerable to additional malware attacks.
Argv may also allow additional malware to be installed onto an infected system.
CJ may harvest private information or download additional malware onto the system.
Rem may also download additional malware and deteriorate the performance of a computer.
Ipp may deteriorate the performance of a system and download additional malware onto it.
Jewdo may also download additional malware onto the system, putting it at greater risk.
Ipb will also connect with a remote server and download additional malware onto the system.
It will download additional malware from a remote server, and infect the system with dangerous threats.
Trojan. FakeAV! gen40 may also download additional malware onto the system.
This option is extremely beneficial if the computer is already infected with additional malware.
JDT allows remote attackers to download additional malware onto a compromised PC.
Remote attacker may also install additional malware onto a compromised PC.
Hackers may also use the backdoor to download additional malware onto the system.
Worms can modify and delete files, andeven inject additional malware onto the computer.
This threat serves the purpose of deploying additional malware to the compromised system.
Troj/Bifrose-ZD may also allow attackers to download additional malware onto the infected system.
Troj/Agent-OXJ may also download and execute additional malware on the compromised machine.