
- #NBA LIVE 2003 WINDOWS 7 SERIAL NUMBERS#
- #NBA LIVE 2003 WINDOWS 7 PDF#
- #NBA LIVE 2003 WINDOWS 7 WINDOWS 8.1#
HKEY_LOCAL_MACHINE\Software\Electronic Arts\EA GAMES\Battlefield 1942 Secret Weapons of WWII HKEY_LOCAL_MACHINE\Software\ashampoo\Ashampoo WinOptimizer Platinum Arts\EA GAMES\Battlefield 1942 HKEY_LOCAL_MACHINE\Software\Elcom\Advanced ZIP Password Recovery
#NBA LIVE 2003 WINDOWS 7 PDF#
HKEY_LOCAL_MACHINE\Software\Elcom\Advanced PDF Password Recovery Pro\Registration HKEY_LOCAL_MACHINE\Software\Elcom\Advanced PDF Password Recovery\Registration HKEY_LOCAL_MACHINE\Software\Adobe\Photoshop\7.0\Registration HKEY_LOCAL_MACHINE\Software\Eugen Systems\ActOfWa HKEY_LOCAL_MACHINE\Software\ACD Systems\PicaView HKEY_LOCAL_MACHINE\Software\ahead\Installation\BAK\Nero 7\Info HKEY_LOCAL_MACHINE\Software\Adobe\Golive\5.0\Registration HKEY_LOCAL_MACHINE\Software\SEGA\Medieval II Total War HKEY_LOCAL_MACHINE\Software\THQ\Dawn of War - Dark Crusade HKEY_LOCAL_MACHINE\Software\THQ\Dawn of War HKEY_LOCAL_MACHINE\Software\Activision\Call of Duty WAW HKEY_LOCAL_MACHINE\Software\Activision\Call of Duty 4 HKEY_LOCAL_MACHINE\Software\Activision\Call of Duty 2 HKEY_LOCAL_MACHINE\Software\Activision\Call of Duty United Offensive HKEY_LOCAL_MACHINE\Software\Activision\Call of Duty HKEY_LOCAL_MACHINE\Software\Ubisoft\Splinter Cell Chaos Theory\Keys HKEY_LOCAL_MACHINE\Software\Ubisoft\Splinter Cell Pandora Tomorrow
#NBA LIVE 2003 WINDOWS 7 SERIAL NUMBERS#
It gathers the cd keys, product keys and serial numbers from the following registries: It steals passwords from the following browsers: It steals passwords from the following messaging and email applications: It access the following SMTP server in preparation to send its stolen information: This worm connects to the following URL(s) to get the affected system's IP address: It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. This worm drops the following copy(ies) of itself in all removable drives:



#NBA LIVE 2003 WINDOWS 7 WINDOWS 8.1#
(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) This worm drops the following copies of itself into the affected system and executes them: It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
