ethical-hacker video for which of the following types of malware remains dormant until the user performs an online financial transaction, replicates itself on
Which of the following types of malware remains dormant until the user performs an online financial transaction, replicates itself on the computer, and edits the registry entries each time the computer starts?