Spyinator

It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact our computer’s performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0

General information:

Malware Name: Spyinator
Malware Type: Malware
Company Name: Spyinator
Company URL: http://spyinator.com/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

Spyinator scans our PC to see if any spy software programs are installed on our system. Spyinator scans our entire PC including Memory, Windows Registry, and all Hard Drives. Spyinator locates even the latest Spyware, Keyloggers, and Adware including Spector, ISpyNow, Spy-Buddy, Gator, Xupiter, Clientman and Many More evil programs. Spyinator also features an always-on shield that runs minimized in the background constantly protecting our PC against certain types of spyware and adware from being installed. If an evil program tries to install spyware or adware, Spyinator will stop it!

Spyware Description:

It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact our computer’s performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0

Characteristics/Symptoms:

    -> False scan results -> False positives work as good to purchase -> Uses inadequate scan/detection scheme -> Uses out of date ref database0

Additional information might be found here:

google Search at Google for Spyinator
bing Search at Bing for Spyinator
yahoo Search at Yahoo for Spyinator

Processes Running:

Spyinator.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Documents and Settings\All Users\Start Menu\Programs\Spyinator v2.0\Spyinator v2.0.lnk 556 Shortcut
C:\Documents and Settings\[USER]\Desktop\Spyinator v2.0.lnk 544 Shortcut
C:\Program Files\Spyinator\BlockedCookies.txt 1061 Text Document

Folder information Created after Installation:

Folder Location

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Spyinator v2.0 UninstallString