Torrent Hash - Hash of all existing torrents
Search Files
Please, pay attention to the fact that you are about to download the torrent NOT from keygenplus.ru
keygenplus.ru is just a torrent search engine, no torrents are hosted here.
keygenplus.ru is just a torrent search engine, no torrents are hosted here.
Norton 360 KeyGen EDGE [TPB] [Starfighterxii]
Infohash:
080C517789F34793F197ACC97E65947DF93ABB0C
Type:
Applications
Title:
Norton 360 KeyGen EDGE [TPB] [Starfighterxii]
Category:
Applications/Windows
Uploaded:
2008-03-06 (by starfighterxii)
Description:
A VIRUS FREE Norton 360 Keygen. Please Help Me Seed This Torrent.
I Provide The Best, Expect No Less!
Files count:
1
Size:
103.50 Kb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
Comments:
bikerbish (2008-03-15)
L O L :-)starfighterxii (2008-03-22)
@ what?yunais (2008-11-29)
PadsPCB,this is not a virus i used this to activate my norton 360 but after a while i tried to install it on my other computer it said that it was a virus maybe norton knows about this keygen and want people to stop getting pirated copys of norton 360
Vouxelence (2009-12-16)
Seems you got a virus... Infostealer.GampassDiscovered: November 12, 2006
Updated: March 16, 2007 7:51:32 AM
Also Known As: LIneage YI [Computer Associates], Bloodhound.KillAV [Symantec]
Type: Trojan
Infection Length: Varies
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows NT, Windows Server 2003, Windows 2000
Once executed, the Trojan may copy itself with a random name in the %Windir% directory.
It may then drop randomly named DLL files in the %System% directory.
The Trojan also may end the following processes:
RavMon.exe
Ravmond.EXE
IPARMOR.EXE
adam.exe
EGHOST.EXE
MAILMON.EXE
KAVPFW.EXE
FilMsg.exe
Twister.exe
Next, it may add a value to one of the following registry subkeys so that it runs every time Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
The Trojan may modify the following registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\"Hidden"
= "2"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\"ShowSuperHidden"
= "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\"NoDriveTypeAutoRun"
= "145"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Advanced\Folder\Hidden\SHOWALL\"CheckedValue"
= "0"It also may log keystrokes when users log into various online games and send them to a predetermined email address or web site.
The Trojan may drop the following malware on to the compromised computer:
Downloader
Hacktool.Rootkit
Files that are detected as Infostealer.Gampass may be malicious. We suggest that you submit to Symantec Security Response any files that are detected as Infostealer.Gampass.