Passwords Active 1.3

dummy

General information:

Malware Name:Passwords Active 1.3
Malware Type:Password Recovery Tool
Company Name:UnKnown
Company URL:
Threat Level:dummy
Operating System:WIN XP
Installation Type:Installed through EXE
Operation:Time of After Installation

Company Description:

Spyware Description:

dummy

Characteristics/Symptoms:

    -> Dummy

Additional information might be found here:

googleSearch at Google for Passwords Active 1.3
bingSearch at Bing for Passwords Active 1.3
yahooSearch at Yahoo for Passwords Active 1.3

Processes Running:

dummy

File information Created after Installation:

File LocationSize (Bytes)Type
C:\Documents and Settings\[USER]\Start Menu\Programs\Passwords Active 1.3\RNLogic.com.lnk1691Shortcut
C:\Documents and Settings\[USER]\Start Menu\Programs\Passwords Active 1.3\Uninstall.lnk1583Shortcut
C:\Program Files\Russian New Logic\Passwords Active 1.3\License.txt2592Text Document

Folder information Created after Installation:

Folder Location
C:\Documents and Settings\[USER]\Start Menu\Programs\Passwords Active 1.
C:\Program Files\Russian New Logic\Passwords Active 1.

Registry information Created after Installation:

Main Registry KeySub Registry KeyKey Value Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Passwords Active 1.3DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Passwords Active 1.3UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Russian New Logic\Passwords Active 1.3BeginTime