Spyware Striker

It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact our computer’s performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0

General information:

Malware Name: Spyware Striker
Malware Type: Adware
Company Name: Ascentive
Company URL: http://www.ascentive.com/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

Ascentive creates easy-to-use downloadable software to enhance our Internet and PC experience. Spyware Striker is a revolutionary new spyware detection and removal application that offers around-the-clock protection. Spyware Striker offers maximum strength security and protects our home or networked environment from malicious spyware and keylogger applications that secretly record our online activity. Spyware Striker was developed with all aspects of security in mind. Its detection routine is second to none and its database continues to grow daily. By offering this level of security to its clients we can rest assured that its services will keep us protected at all times.

Spyware Description:

It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact our computer’s performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0

Characteristics/Symptoms:

    -> False positives work as good to purchase -> False scan results -> Uses inadequate scan/detection scheme0

Additional information might be found here:

google Search at Google for Spyware Striker
bing Search at Bing for Spyware Striker
yahoo Search at Yahoo for Spyware Striker

Processes Running:

SpywareStriker.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\Ascentive\Spyware Striker\Activex.dat 13415 DAT File
C:\Program Files\Ascentive\Spyware Striker\adnetworklist.dat 2335 DAT File
C:\Program Files\Ascentive\Spyware Striker\bholist.dat 51751 DAT File

Folder information Created after Installation:

Folder Location

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_CURRENT_USER SoftwareAscentiveSpyware Striker Pro EXPAND_TREEVIEW
HKEY_CURRENT_USER \Software\Ascentive\Spyware Striker Pro LEFT
HKEY_CURRENT_USER \Software\Ascentive\Spyware Striker Pro SHOW_WARNING