"When this Trojan horse runs on the user's computer, it may perform several actions, including monitoring Internet access to capture sensitive information such as logon names and passwords ...
Some results have been hidden because they may be inaccessible to you