Internet Spy

Internet Spy monitors every Web page accessed on the computer and makes a chronological record of all visited URLs. It includes elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect preferred network connections and can negatively impact computer’s performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0

General information:

Malware Name: Internet Spy
Malware Type: Key Logger
Company Name: Spy Arsenal
Company URL: http://spyarsenal.com/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

Spy Arsenal provides various software for monitoring and security of PC. One of its software is Internet Spy. Internet Spy is a tiny freeware utility that continuously monitors every Web page accessed on the computer and makes a chronological record of all visited URLs. Internet Spy is compatible with all version of Microsoft Internet Explorer, it features the ability to automatically load at each system startup and can optionally run in the stealth mode (when this mode is enabled the program is impossible to detect and can run in the background for months absolutely unnoticed by the user). All visited URLs are written to a plain text file that can be accessed from any other computer in the local network. Internet Spy is an ideal solution for Web activity surveillance that can be used by concerned parents or employers.

Spyware Description:

Internet Spy monitors every Web page accessed on the computer and makes a chronological record of all visited URLs. It includes elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect preferred network connections and can negatively impact computer’s performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for Internet Spy
bing Search at Bing for Internet Spy
yahoo Search at Yahoo for Internet Spy

Processes Running:

InternetSpy.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\Internet Spy\Links\bg1.gif 1188 GIF Image
C:\Program Files\Internet Spy\README.TXT 1012 Text Document
C:\Program Files\Internet Spy\uninstall.exe 34139 Application

Folder information Created after Installation:

Folder Location
C:\Program Files\Internet Spy
C:\Program Files\Internet Spy\Links

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallInternetSpy DisplayName
HKEY_LOCAL_MACHINE \ SOFTWARE\KMiNT21\InternetSpy LogPath
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\InternetSpy UninstallString