Which of the following is not an example of malicious code

Trojan horse
Worm
Virus
Spy gear

Spy gear