Vista Antispyware 2012
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 80 % (High) |
Infected Computers: | 8 |
First Seen: | December 5, 2011 |
Last Seen: | February 2, 2021 |
OS(es) Affected: | Windows |
Vista Anti-Spyware 2012 is thought to have been created in the Russian Federation. The first instances of this rogue anti-spyware infection started appearing in early June of 2011. Vista Anti-Spyware is one of the dozens of possible clones of the Ppn.exe process, a harmful file that attempts to blackmail users into giving up their credit card information. This application is unique in that Vista Anti-Spyware 2012 uses different names and skins depending on the user's operating system. This is a unique development that has caused security specialists from all over the world to start paying attention.
Table of Contents
How Did Ppn.exe Get on My Computer?
Ppn.exe is usually delivered through a Trojan, a piece of code that exploits a weakness in your computer's security to deliver harmful software. This Trojan was probably acquired by visiting infected websites or using fake computer scans online. Apart from these, other ways of downloading this and other harmful software are: clicking on banners and pop-up adds on adult websites and file sharing networks, downloading fake video codecs and applications from adult video sites, and opening attachments in suspicious spam emails. The first sign of the Trojan is a notification from Windows Automatic Update that, although realistic looking, is completely fake. This fake update will download one of dozens of different skins and names for Ppn.exe, in this case Vista Anti-Spyware 2012. There are three different possible groups of skins, corresponding to the operating systems Windows XP, Windows Vista, and Windows 7. Vista Anti-Spyware 2012 is one of dozens of possible Ppn.exe themes for computer users running the Windows Vista operating system.
What Does Vista Anti-Spyware 2012 Do?
Once Vista Anti-Spyware is installed in a computer system, Vista Anti-Spyware 2012 will alter the registry so that Vista Anti-Spyware 2012 will run when Windows starts up. Upon entering Windows, the user will be greeted by the Vista Anti-Spyware 2012 screen, claiming that Vista Anti-Spyware 2012 is running a system scan. This scan is not real. The Vista Anti-Spyware 2012 fake scan will claim that there are numerous infected files on the user's system, and then will prompt the user to enter his credit card information to buy a license, so the supposed infection can be removed. Entering the credit card information into Vista Anti-Spyware 2012 does nothing, since Vista Anti-Spyware 2012 is the infection on the system. Vista Anti-Spyware 2012 uses Trojans or rootkits to block certain essential system folders and files, and to affect browsing habits. Trojans and rootkits can change the user's homepage and constantly redirect the user to websites asking for payment on a rogue anti-spyware program like Vista Anti-Spyware 2012 or may also block access to the Internet altogether. All of Vista Anti-Spyware 2012 tricks are used to scare computer users into thinking that their system is infected by numerous viruses. Blocking access to the Internet, Task Manager, and other system folders also has the result of turning it a lot more difficult to remove Vista Anti-Spyware 2012 and similar fake security programs.
How to Avoid Being Infected with Vista Anti-Spyware 2012
There are some simple steps that any user can take to avoid being infected by Vista Anti-Spyware 2012 and similar rogue anti-spyware programs.
- Use a trustworthy anti-virus or anti-malware application and scan your system regularly.
- Avoid visiting suspicious websites, especially adult video websites and file sharing networks.
- If you cannot avoid visiting these websites, do not click on banner advertisements, pop-up windows, or download any files.
- Keep your system protected with a regularly updated firewall.
Vista Antispyware 2012 Video
Tip: Turn your sound ON and watch the video in Full Screen mode.
File System Details
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | %AppData%\Local\[RANDOM CHARACTERS].exe | |
2. | %Temp%\[RANDOM CHARACTERS] | |
3. | %AllUsersProfile%\[RANDOM CHARACTERS] | |
4. | %UserProfile%\Start Menu\Programs\Vista Antispyware 2012.lnk | |
5. | %AppData%\Roaming\Microsoft\Windows\Templates\[RANDOM CHARACTERS] | |
6. | %UserProfile%\Desktop\Vista Antispyware 2012.lnk | |
7. | %AppData%\Local\[RANDOM CHARACTERS] |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.