Fake Scanner Sites
Google Search Redirects
Alias: BW, Univ, BW.Cowpox, BW.556 - Dropper,, BW.1_00.Based Constructor, BW.343, BW-based
Description: Trojan/Worm/Backdoor/BW-based-1 is trojan. A Trojans or Trojan Horse is any programs that installs itself secretly normally via malware programs, quite often with sinister intent. Once installed, the trojan author (hacker) can gain complete control of the infected PC. Trojans are usually designed to steal sensitive information and/or destroy the system. Trojans can be distributed as unsolicited email attachments, or bundled with freeware and shareware programs.
Backdoor - A Backdoor is an undocumented or secret means that can be used to obtain unauthorized access to your computer, or a malicious program that uses such a means to penetrate a computer system. Backdoor applications exploit vulnerabilities of installed programs or operating system and allow attackers to gain control over your computer system. Backdoor works in the background and hides from the user. It is always a high security risk.
Downloader - A Downloader is a software application or part of the program which is designed to retrieve (download) and install additional files from the Internet. Malware programs often include Downloaders which allow the Malware to continually update themselves, thereby eluding detection.
Exploit - Exploit is a general term describing a way of breaking into a system. Exploits take advantage of a weakness in a computer system in order to hack it.
Flooder - A Flooder is any software application that tries to overload a connection by any intrusive mechanism, such as fast pinging, causing a Denial of Service attacks, Ping of Death attacks, ICMP attacks, http overload attacks, etc.
Hacker Tool - A Hacker Tool is any software application that performs a wide range of hacking related tasks without user's permission. Activities include: disabling a user's anti-virus software or personal firewalls, gaining access to sensitive data, removing copy protection and modifying system settings.
Key Logger - A Key logger is a software application that runs in the background and records any keyboard activity. Logged information is stored in the machine and can be retrieved later by the attacker through the internet connection. Key loggers can record sensitive information such as passwords, credit card numbers, personal identification numbers, etc. Key loggers are commonly included as parts of other spyware programs.
Nuker - A Nuker is a software application that is designed to disable user's computer. It may cause damage to the file system, windows registry, key files, system files, etc.
Trojan - A Trojans or Trojan Horse is any programs that installs itself secretly normally via malware programs, quite often with sinister intent. Once installed, the trojan author (hacker) can gain complete control of the infected PC. Trojans are usually designed to steal sensitive information and/or destroy the system. Trojans can be distributed as unsolicited email attachments, or bundled with freeware and shareware programs.
Worm - A Worm is a virus-like software application which spreads itself to other computers. Worms send themselves out to email addresses collected from the infected PC. Worms are known to mutate and they usually carry a destructive payload.
Advice: Remove This is a very high risk threat and should be removed immediately as to prevent harm to your computer and / or to protect your privacy.
SpyNoMore removes Trojan/Worm/Backdoor/BW-based-1: Yes
Threat risk: High Risk
Very dangerous malware. Can log user's keyboard activity and take snapshots of the user's screen. Uses stealth installation and removal is very difficult. Category includes spyware programs, adware programs and trojans.
Running Process Signatures:
Registered Dll (Dynamic Link Library) Signatures:
SpyNoMore Collected Residual File Signatures: