Bride & FunLove Removal Tool Crack Full Version

Bride & FunLove Removal Tool is a lightweight utility that will enable you to clean the virus from your computer in a flash.

Win32.Bride.A@mm is a mass-mailing worm written in Visual Basic, which carries along the file infector Win32.FunLove.4070. The FunLove body and most of the character strings used by the virus are encrypted, to make reverse engineering more difficult. The worm arrives in an email message.

Download Bride & FunLove Removal Tool Crack

Software company
Rank 4.6
838 4.6
Crack size ~ 500KB
Downloads total 6725
Systems Win All

Email messages containing the worm will be sent to addresses gathered by scanning .htm and .dbx files, and also to the anonymous user on the name/domain server.

The worm will overwrite the beginning of msconfig.exe (in the Windows System folder) with a sequence of code that drops a version of the file infector Win32.FunLove.4070 in bride.exe; this virus contains the following text: DonkeyoVaccineiEraser instead of the original Fun Loving Criminal. This dangerous virus will proceed to infecting executable files on the local system and on network shared folders.

Win32.Bride.B@mm is the second version of the mass-mailer Win32.Bride.A@mm; it doesn't carry along the FunLove file infector anymore, and doesn't install itself (it won't automatically be run at Windows start-up). Its strings are no longer encrypted and on Windows NT/2000/XP the executable might not be run (its format is slightly damaged, and the NT versions make more thorough verifications of executable format compliance than the 9x versions). The worm arrives in an email message.

Win32.Bride.C@mm is another version of Win32.Bride.A@mm was written in Visual C++. Most of its strings are encrypted and the worm brings along the Win32.FunLove.4070 file infector once again.

It arrives attached to an email message in the following format:

From: ‹Registered Owner›

or: AntiVirus

or: ‹forged address› (may be the same with the recipient's)

Subject: Re: AVAR(Association of Anti-Virus Asia Reseachers)

or: ‹Unreadable characters›‹Registered Organization›

or: ‹Unreadable characters›Trand Microsoft Inc.

Body:

AVAR(Association of Anti-Virus Asia Reseachers) - Report.

Invariably, Anti-Virus Program is very foolish.

Attachments:

‹random name›.TXT (12.6 KB) MUSIC_1.HTM

‹random name›.GIF (120 bytes) MUSIC_2.CEO

‹random name›.PIF

The worm exploits the IFRAME vulnerability in order for the attached executable to be automatically launched when the message is displayed in the preview pane, and the Microsoft VM ActiveX Component vulnerability in order for the HTM file to add CEO to the executable files extensions and the worm to be run when the user opens the attached CEO file.

Comments

Jennifer, 17 December 2017

grazie

maicon, 27 December 2016

cheers, thanks

Leave a comment

Your email will not be published. * Required