Purpose of Bridge.dll for Windows XP

The bridge.dll file for Windows XP is related to the following adware and spyware programs.

  • Adware Flingstone Bridge
  • Adware WinFavorites
  • Keylogger TrojanSpy.Win32.Briss
  • Adware LoudMarketing.Bridge

In this article, we are going to discuss the methods to get rid of each adware program and thus get rid of the bridge.dll file.

Adware Flingstone Bridge

This adware program works by downloading files from the Website FlingStone.com and displays the following properties:

  • Shows unwanted and troublesome popup ads in the system.
  • Stays hidden from the user.
  • Stays resident and works in the background.

To manually remove this adware from your computer, you need to do the following:

  1. Open the Registry Editor window by running the regedit command and then perform the following tasks:
  • Navigate to the following key:
    • Delete the value: RunDLL
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    • Next, delete the following registry keys:
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID{9C691A33-7DDA-4C2F-BE4C-C176083F35CF}
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects{9C691A33-7DDA-4C2F-BE4C-C176083F35CF}
    • Next, open Windows Explorer, search for and delete the bridge.dll file.

Adware WinFavorites

WinFavorites is an adware program that usually comes bundled up with products that support advertising. The program can also be installed manually by the system. This adware program runs at system startup and displays the following properties:

  • Displays unwanted commercial advertisements.
  • Stays hidden from the user.
  • Stays resident and works in the background.
  • Connects to the Internet and downloads and executes potentially harmful files on your system.

To manually remove the WinFavrites adware from your computer, you need to do the following:

  1. Open the Registry Editor (regedit) and delete the following registry keys:
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mswpl
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\systray
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinFavorites
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RunDLL=rundll32.exe %System%\bridge.dll,load
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Bridge.brdg
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Bridge.brdg.1
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Jao.jao
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Jao.jao.1
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{78E25B5D-78E25B5D-78E25B5D-78E25B5D-78E25B5D}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{80BB7465-A638-43B5-9827-8E8FE38DFCC1}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9C691A33-7DDA-4C2F-BE4C-C176083F35CF}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4FDBDBAD-FEFE-4C4C-9CC1-1181052AFB12}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B88A3AF1-4F1B-4400-8FFB-3FCB108CE115}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{C094876D-1B0E-46FA-B6A6-7FFc0F970c27}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DDAF2479-6F00-4599-998A-3ED75686C6D0}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion \explorer\Browser Helper Objects\{9C691A33-7DDA-4C2F-BE4C-C176083F35CF}
    • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\bridge
    • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Win Favorites
  2. Search for and delete the following files from the system:
    • a.exe
    • bridge.exe
    • winfavorites.exe
    • bridge.dll
    • jao.dll
  3. Open Windows Explorer and delete the C\Program Files\WinFavorites directory.

Keylogger TrojanSpy.Win32.Briss.

TrojanSpy.Win32.Briss stealthily installs on your computer and starts logging all your keystrokes and starts transmitting them to a hacker. Some of the properties of this Keylogger program are:

  • Logs your key presses and gathers all your passwords and other important and confidential information.
  • Reports the information about your hard drives and operating system to hackers.
  • Autoupdates itself with its latest versions.
  • Transmits logged information to hackers by making an FTP connection or through e-mails.
  • Stays resident in the background and thus is hidden from the user.

In order to remove this keylogger from you computer, you need to perform the following tasks:

  1. First, kill the following processes using Task Manager (Ctrl + Alt + Del)
    • a.exe
    • trojanspy.win32.briss.j.exe
  2. Next, in the Registry Editor window, delete the following registry keys:
    • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
    • HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\systray
  3. Next, use the regsvr32 /u command to unregister the bridge.dll and trojanspy.win32.briss.b.dll files.
  4. Note: To use the command, you will have to provide the full path to the DLL file you are unregistering.

  5. Finally, delete the following files:
    • bridge.dll
    • bridge.inf
    • fasetupstart.inf
    • fasetupstart.ocx
    • a.exe
    • trojanspy.win32.briss.b.dll
    • trojanspy.win32.briss.j.exe

Adware LoudMarketing.Bridge.

Adware LoudMarketing.Bridge stealthily infiltrates your system when you browse a malicious Web site, install adware supported software and applications that have an adware module embedded within them. Some of the properties displayed by this adware software are:

  • Displays unwanted pop advertisements and installs advertising toolbars on your computer.
  • Hijacks your Web pages and reroutes you to advertising Web sites.
  • Slows down your system.
  • Violates user privacy.
  • Stays resident in the background and thus is hidden from the user.

To manually remove this adware from the computer, you need to do the following:

  1. First use the regsvr32 /u command to unregister the bridge.dll file.
  2. Next, delete the bridge.dll and bridge.inf files.

Manual removal of adware and keylogger programs is tedious and because the removal process involves editing the registry, the chances of errors are quite high. Therefore, it is recommended that you use a reliable, efficient, and updated antispyware tool to perform a full system scan and weed out all malicious information from within it. You may also follow up the antispyware scan with a thorough registry scan with the help of a registry cleaner tool. This will help you ensure complete removal of the adware and spyware programs on the system. Because the adware and spyware programs add many registry keys and files on the system, there are some third-party removal programs also available to help you get rid of them. You can download one of these tools from the RegServe website, and use it to eliminate unwanted programs from your system.