Win32.Badtrans.B@mm Detection & Clean 1.0.0.1 Crack Full Version
Win32.Badtrans.B@mm Detection & Clean is a small utility that can help you get rid of the malware infection.
The virus comes in the following format:
Download Win32.Badtrans.B@mm Detection & Clean Crack
Software developer |
Bitdefender LLC
|
Grade |
4.0
806
4.0
|
Downloads count | 6860 |
File size | < 1 MB |
Systems | Windows All |
From: e-mail address of the infected sender or one of the following e-mail addresses:
"Anna" [email protected]
"JUDY" [email protected]
"Rita Tulliani" [email protected]
"Tina" [email protected]
"Kelly Andersen" [email protected]
" Andy" [email protected]
"Linda" [email protected]
"Mon S" [email protected]
"Joanna" [email protected]
"JESSICA BENAVIDES" [email protected]
"Administrator" [email protected]
"Admin" [email protected]
"Support" [email protected]
"Monika Prado" [email protected]
"Mary L. Adams" [email protected]
Subject: Empty or having the following content:
RE:
RE: [original subject]
Body: Empty
Attachment: The name of the attachement is formed using one of the following words:
fun
Humor
docs
info
Sorry_about_yesterday
Me_nude Card
SETUP
stuff
YOU_are_FAT!
HAMSTER
news_doc
New_Napster_Site
README
images
Pics
The extension of the attachment could be a combination of .MP3., .DOC., .ZIP., with .scr., .pif. or just .scr or .pif.
The worm is using the IFRAME vulnerability and it will be executed on computers with Outlook Express just by preview. Computers with security patch will be infected only by executing the attachment.
After execution the worm copies itself in Windows %System% directory under the kernel32.exe name, and it will drop the kdll.dll at the same location.
To ensure that it will be executed at restart it adds the following registry key:
[HKLMSoftwareMicrosoftWindowsCurrentVersionRunOnceKernel32]
with value kernel32.exe.
Then it will delete itself from the location where it was executed, and it will gather computer information (like User name, computer name, RAS information, passwords, so on) and sends it to the following e-mail address: [email protected]
The Worm has two methods of getting e-mail addresses:
It search them in *ht* and *.asp files in Internet Cache directory or it gets them with MAPI functions from e-mails received by the infected user.
It will not send itself twice to the same address because it keeps the already used e-mail addresses in %SYSTEM%PROTOCOL.DLL.