Spyinator
It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browserâs homepage and search settings. These threats may install advertising-related
add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact
our computerâs performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0
General information:
Malware Name: |
Spyinator |
Malware Type: |
Malware |
Company Name: |
Spyinator |
Company URL: |
http://spyinator.com/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
Spyinator scans our PC to see if any spy software programs are installed on our system. Spyinator scans our entire PC including Memory, Windows Registry, and all Hard Drives. Spyinator locates even the latest Spyware, Keyloggers, and Adware including
Spector, ISpyNow, Spy-Buddy, Gator, Xupiter, Clientman and Many More evil programs. Spyinator also features an always-on shield that runs minimized in the background constantly protecting our PC against certain types of spyware and adware from being
installed. If an evil program tries to install spyware or adware, Spyinator will stop it!
Spyware Description:
It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browserâs homepage and search settings. These threats may install advertising-related
add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact
our computerâs performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0
Characteristics/Symptoms:
-> False scan results -> False positives work as good to purchase -> Uses inadequate scan/detection scheme -> Uses out of date ref database0
Additional information might be found here:
Processes Running:
Spyinator.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Documents and Settings\All Users\Start Menu\Programs\Spyinator v2.0\Spyinator v2.0.lnk |
556 |
Shortcut |
C:\Documents and Settings\[USER]\Desktop\Spyinator v2.0.lnk |
544 |
Shortcut |
C:\Program Files\Spyinator\BlockedCookies.txt |
1061 |
Text Document |
Folder information Created after Installation:
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Spyinator v2.0 |
UninstallString |