Vista Antispyware 2013

Vista Antispyware 2013 Description

Type: Adware

ScreenshotESG security researchers have received reports of new variants of the FakeRean family of rogue security programs. These newest variants of this dangerous family of malware add the '2013' string to each fake security program's name. Vista Antispyware 2013 is one of dozens of fake security programs released in October of 2012 in anticipation of the coming New Year. The main feature of Vista Antispyware 2013's family of malware is that these fake security programs have the ability to adapt to the operating system being used on the infected computer.

Vista Antispyware 2013 and other malware in this fake security software family are installed with the aid of Trojans typically downloaded as part of social engineering scams. Some examples of Vista Antispyware 2013 family members are Windows Antivirus 2008, Vista Antivirus 2008, Antivirus Pro 2009, AntiSpy Safeguard, ThinkPoint, Spyware Protection 2010, Internet Antivirus 2011, Palladium Pro, XP Anti-Virus 2011, CleanThis, PC Clean Pro, XP Home Security 2012, Windows Clear Problems, XP Security 2012, Antivirus PRO 2015.

How Vista Antispyware 2013 Adapts to Your Computer's Operating System

Vista Antispyware 2013 attacks computers that are using the Windows Vista operating system. Vista Antispyware 2013 has the ability to adapt to the victim's computer. If the Windows XP or Windows 7 operating systems are being used on the infected computer, then rather than installing Vista Antispyware 2013, the Trojan responsible for installing these fake security programs will install XP Antispyware 2013 or Win 7 Antispyware 2013 respectively for both of these two operating systems. ESG team of malware analysts considers that Vista Antispyware 2013 poses a severe threat to a computer's security and that you should use a strong anti-malware solution to remove this bogus security program.

Vista Antispyware 2013 has no components that allow Vista Antispyware 2013 to detect or remove malware or spyware in a computer. Rather, Vista Antispyware 2013 is designed to display numerous fake alerts and system error messages that are designed to convince inexperienced computer users that their computer has become invaded with dangerous viruses, spyware and Trojans. Trying to use Vista Antispyware 2013 to remove these nonexistent malware threats from the infected computer is futile. Doing this leads to error messages that prompt the victim to pay for a nonexistent full version of this fake security program. Criminals do this to steal their victims' money as well as to gain unauthorized access to a computer user's credit card. ESG security researchers strongly advise against paying for Vista Antispyware 2013 supposed full version, even if only in an attempt to stop this bogus security program from displaying irritating error messages.Screenshot

Technical Information

File System Details

Vista Antispyware 2013 creates the following file(s):
# File Name Detection Count
1 %LocalAppData%\[RANDOM CHARACTERS].exe N/A
4 %AppData%\Roaming\Microsoft\Windows\Templates\[RANDOM CHARACTERS] N/A

Registry Details

Vista Antispyware 2013 creates the following registry entry or registry entries:
Registry key
HKEY_CURRENT_USER\Software\Classes\ "(Default)" = 'Application'
HKEY_CURRENT_USER\Software\Classes\\DefaultIcon "(Default)" = '%1'
HKEY_CLASSES_ROOT\ah\shell\open\command "IsolatedCommand"
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command "(Default)" = ""%LocalAppData%\.exe -a "C:\Program Files\Mozilla Firefox\firefox.exe""
HKEY_CURRENT_USER\Software\Classes\.exe "(Default)" = ''
HKEY_CURRENT_USER\Software\Classes\\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*
HKEY_CLASSES_ROOT\.exe\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command "(Default)" = ""%LocalAppData%\.exe" -a "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode"
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*
HKEY_CLASSES_ROOT\ah\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command "(Default)" = ""%LocalAppData%\.exe" -a "C:\Program Files\Internet Explorer\iexplore.exe""

More Details on Vista Antispyware 2013

The following messages associated with Vista Antispyware 2013 were found:
Critical System Alert!
Unknown software is try to take control over your system!
Privacy alert!
Rogue malware detected in your system. Data leaks and system damage are possible. Click here for a free security scan and spyware deletion.
System danger!
Your system security is in danger. Privacy threats detected. Spyware, keyloggers or Trojans may be working in the background right now. Perform an in-depth scan and removal now, click here.
System hacked!
Unknown program is scanning your system registry right now! Identity theft detected!
System hijack!
System security threat was detected. Viruses and/or spyware may be damaging your system now. Prevent infection and data loss or stealing by running a free security scan.

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.