Home Articles Spyware Research Support Scan Now Purchase F.A.Q.

Trojan/Worm/Backdoor/BW-based-5

Alias: BW.Mayberry.687, Univ,, BW-based, Bw.Mayberry.Gomer virus, Gomer.Family.691

Description: Trojan/Worm/Backdoor/BW-based-5 is trojan. A Trojans or Trojan Horse is any programs that installs itself secretly normally via malware programs, quite often with sinister intent. Once installed, the trojan author (hacker) can gain complete control of the infected PC. Trojans are usually designed to steal sensitive information and/or destroy the system. Trojans can be distributed as unsolicited email attachments, or bundled with freeware and shareware programs.

Threat type:

Backdoor - A Backdoor is an undocumented or secret means that can be used to obtain unauthorized access to your computer, or a malicious program that uses such a means to penetrate a computer system. Backdoor applications exploit vulnerabilities of installed programs or operating system and allow attackers to gain control over your computer system. Backdoor works in the background and hides from the user. It is always a high security risk.

Downloader - A Downloader is a software application or part of the program which is designed to retrieve (download) and install additional files from the Internet. Malware programs often include Downloaders which allow the Malware to continually update themselves, thereby eluding detection.

Dropper - A Dropper is a software application or part of the program which is designed to install hostile code onto the system of the targeted computer. Usually, a Dropper comes bundled as part of a virus or trojan.

Exploit - Exploit is a general term describing a way of breaking into a system. Exploits take advantage of a weakness in a computer system in order to hack it.

Flooder - A Flooder is any software application that tries to overload a connection by any intrusive mechanism, such as fast pinging, causing a Denial of Service attacks, Ping of Death attacks, ICMP attacks, http overload attacks, etc.

Hacker Tool - A Hacker Tool is any software application that performs a wide range of hacking related tasks without user's permission. Activities include: disabling a user's anti-virus software or personal firewalls, gaining access to sensitive data, removing copy protection and modifying system settings.

Key Logger - A Key logger is a software application that runs in the background and records any keyboard activity. Logged information is stored in the machine and can be retrieved later by the attacker through the internet connection. Key loggers can record sensitive information such as passwords, credit card numbers, personal identification numbers, etc. Key loggers are commonly included as parts of other spyware programs.

Nuker - A Nuker is a software application that is designed to disable user's computer. It may cause damage to the file system, windows registry, key files, system files, etc.

Trojan - A Trojans or Trojan Horse is any programs that installs itself secretly normally via malware programs, quite often with sinister intent. Once installed, the trojan author (hacker) can gain complete control of the infected PC. Trojans are usually designed to steal sensitive information and/or destroy the system. Trojans can be distributed as unsolicited email attachments, or bundled with freeware and shareware programs.

Worm - A Worm is a virus-like software application which spreads itself to other computers. Worms send themselves out to email addresses collected from the infected PC. Worms are known to mutate and they usually carry a destructive payload.


Advice: Remove This is a very high risk threat and should be removed immediately as to prevent harm to your computer and / or to protect your privacy.

Detection:
SpyNoMore removes Trojan/Worm/Backdoor/BW-based-5: Yes

Threat risk: High Risk
Remove BW-based-5, BW-based-5 Remover
Very dangerous malware. Can log user's keyboard activity and take snapshots of the user's screen. Uses stealth installation and removal is very difficult. Category includes spyware programs, adware programs and trojans.

Symptoms:

Trojan/Worm/Backdoor/BW-based-5 Signature Details: The following information includes some of the standard signatures associated with this spyware threat. Please do not attempt to manually remove these items from your computer; Removing these items incorrectly or partially can cause your computer to experience critical errors, prevent your computer from restarting or cause loss of Internet connectivity. Should you be infected with Trojan/Worm/Backdoor/BW-based-5, you can clean your computer by downloading SpyNoMore now.

Running Process Signatures:
N/A

File Signatures:
N/A

Registered Dll (Dynamic Link Library) Signatures:
N/A

Folder Signatures:
N/A

Registry Signatures:
N/A

SpyNoMore Collected Residual File Signatures:
N/A


See Also:
Trojan/Worm/Backdoor/PS-MPC-based-1
Trojan/Worm/Backdoor/BW-based-2
Trojan/Worm/Backdoor/PS-MPC-based-2
Trojan/Worm/Backdoor/BW-based-3
Trojan/Worm/Backdoor/BW-based-4
Trojan/Worm/Backdoor/BW-based-6
Trojan/Worm/Backdoor/BW-based-7
Trojan/Worm/Backdoor/BW.Gateway.372
Trojan/Worm/Backdoor/BW-based-8
Adware/Krepper.ab

Spyware Removal Home | Support | F.A.Q. | Spyware Removal Database | Privacy Policy | Site Map
Copyright © 2005-2012 Illysoft LLC