Passwords Active 1.3
dummy
General information:
Malware Name: |
Passwords Active 1.3 |
Malware Type: |
Password Recovery Tool |
Company Name: |
UnKnown |
Company URL: |
|
Threat Level: |
dummy |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
Spyware Description:
dummy
Characteristics/Symptoms:
-> Dummy
Additional information might be found here:
Processes Running:
dummy
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Documents and Settings\[USER]\Start Menu\Programs\Passwords Active 1.3\RNLogic.com.lnk |
1691 |
Shortcut |
C:\Documents and Settings\[USER]\Start Menu\Programs\Passwords Active 1.3\Uninstall.lnk |
1583 |
Shortcut |
C:\Program Files\Russian New Logic\Passwords Active 1.3\License.txt |
2592 |
Text Document |
Folder information Created after Installation:
Folder Location |
C:\Documents and Settings\[USER]\Start Menu\Programs\Passwords Active 1. |
C:\Program Files\Russian New Logic\Passwords Active 1. |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Passwords Active 1.3 |
DisplayName |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Passwords Active 1.3 |
UninstallString |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Russian New Logic\Passwords Active 1.3 |
BeginTime |