Murphy_Week7Lab
docx
School
American Military University *
*We aren’t endorsed by this school
Course
262
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
7
Uploaded by SuperSalmon3533
There are 3 threats present that are Achtung.exe
From searching up the Achtung.exe file on google, Solvusoft.com and Windowsbulletin.com says that most of these are the result of missing or corrupt versions of the executable files, this is an executable file from the Hackers Handbook. To ensure that it is safe, checking the file path and making sure it is pathed correctly is a great start (C:\Program Files\Dark Bay Ltd.\Hacker's Handbook\
achtung.exe). Checking the verified signer may be another action that should take place, if it is unable to verify the file, further investigation should be taken. If the Achtung.exe file is safe it should not be deleted for it could impact related programs
with the executable file. If you believe it to be malicious, using a reliable antivirus remover would be optimal, these tool will help remove any malware found on the device. If the user just wants it gone, even if it is not malicious, just uninstall it using
the steps below.
1. In the Start menu (for Windows 8, right-click the screen's bottom-left corner), click Control bn Panel, and then under Programs:
Windows Vista/7/8.1/10: Click Uninstall a Program.
Windows XP: Click Add or Remove Programs.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2. When you find the program Hacker's Handbook, click it, and then:
Windows Vista/7/8.1/10: Click Uninstall.
Windows XP: Click the Remove or Change/Remove tab (to the right of the program).
3. Follow the prompts to remove Hacker's Handbook.
There are 3 threats from KEYCOPY.COM
TrojanSpy:DOS/Keycopy
Detected by Microsoft Defender Antivirus
Aliases: No associated aliases
Summary
Microsoft Defender Antivirus detects and removes this threat. This threat can collect
your sensitive information and send it to a malicious hacker. Find out ways that malware can get on your PC. What do we do now? Use the following free Microsoft software to detect and remove this threat: Windows Defender for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista Microsoft Safety Scanner. You should also run a full scan. A full scan might find other
hidden malware. Protect your sensitive information. This threat tries to steal your sensitive and confidential information. If you think your information has been stolen,
see: What to do if you are a victim of fraud.
You should change your passwords after you've removed this threat: Create strong passwords
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help