Categories: Trojan,Spyware
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.
[Kaspersky]TrojanSpy.Win32.Fearless.20;
[Panda]Trj/Fearless.C,Trojan Horse.LC;
[Computer Associates]Win32.FearlessKeySpy.20.A,Win32/Fearless.20!Spy!Trojan,Win32/FearlessKeySpy.20.A!Trojan
Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\fks2.0_server.exe
[%WINDOWS%]\system\fks2.0_server.exe
How to detect Fearless.KeySpy:
Files:
[%WINDOWS%]\system\fks2.0_server.exe
[%WINDOWS%]\system\fks2.0_server.exe
Removing Fearless.KeySpy:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
No comments:
Post a Comment