Passwords Active 1.3

dummy

General information:

Malware Name: Passwords Active 1.3
Malware Type: Password Recovery Tool
Company Name: UnKnown
Company URL:
Threat Level: dummy
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation

Company Description:

Spyware Description:

dummy

Characteristics/Symptoms:

    -> Dummy

Additional information might be found here:

google Search at Google for Passwords Active 1.3
bing Search at Bing for Passwords Active 1.3
yahoo Search at Yahoo for Passwords Active 1.3

Processes Running:

dummy

File information Created after Installation:

File Location Size (Bytes) Type
C:\Documents and Settings\[USER]\Start Menu\Programs\Passwords Active 1.3\RNLogic.com.lnk 1691 Shortcut
C:\Documents and Settings\[USER]\Start Menu\Programs\Passwords Active 1.3\Uninstall.lnk 1583 Shortcut
C:\Program Files\Russian New Logic\Passwords Active 1.3\License.txt 2592 Text Document

Folder information Created after Installation:

Folder Location
C:\Documents and Settings\[USER]\Start Menu\Programs\Passwords Active 1.
C:\Program Files\Russian New Logic\Passwords Active 1.

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Passwords Active 1.3 DisplayName
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Passwords Active 1.3 UninstallString
HKEY_LOCAL_MACHINE \SOFTWARE\Russian New Logic\Passwords Active 1.3 BeginTime