XP Security 2012

XP Security 2012 Description

ScreenshotIn the year 2011, the Internet was flooded with dozens of versions of the malicious file Ppn.exe. XP Security 2012 is one of the many different faces of this harmful file. Every day there are new names and skins for the Ppn.exe process, making it quite difficult for security experts to keep track of the exact number of disguises this shifty file can use.

How XP Security 2012 Tries to Trick You

XP Security 2012 is part of a scam that tries to trick users into thinking that their computer is infected by any number of viruses and spyware. In fact, XP Security 2012 is in itself a malicious security program. XP Security 2012 is designed to disrupt the computer's normal operation and then to scare the user into paying to remove XP Security 2012. This kind of rogue anti-spyware application is known as scareware. XP Security 2012 basic way of working is by disrupting your computer, then running a fake scan, and then disguising itself as a legitimate security application. This rogue security application will then demand that the scared user enter his credit card information to get rid of the supposed virus attack.

What Makes XP Security 2012 Unique?

While the most common rogue anti-spyware applications that came before Ppn.exe could have dozens of clones (differently named copies of the same program,) XP Security 2012 and other versions of Ppn.exe are not technically clones. All of the different versions of Ppn.exe are the same program, with different names and skins to match the user's operating system. That means that a computer user using Windows Vista would not become infected with XP Security 2012 but rather with a version of Ppn.exe specific for Windows Vista. This version of Ppn.exe could be called Vista Security 2012, or any other number of names that make XP Security 2012 seem a legitimate Windows Vista security application.

How Does Ppn.exe Adapt to an Operating System?

Ppn.exe is acquired through a Trojan, a harmful bit of code that uses known security vulnerabilities to enter a computer and deliver XP Security 2012's dangerous payload. The first sign of the Trojan intrusion is a fake notification from the fake Windows Automatic Update which is used to install XP Security 2012. When Ppn.exe has been is been installed, it checks for the user's operating system and downloads skins corresponding to that operating system. There are three sets of skins, each containing a huge amount of possible versions of Ppn.exe with new ones being created each day. There is a Windows XP set, a Windows Vista set, and a Windows 7 set. This version of Ppn.exe, XP Security 2012, is part of the Windows XP set. Similar skins from the other two sets would be named Vista Security 2012 and Windows 7 Security 2012 or Win 7 Security 2012. The skins are designed to look similar to the normal windows and themes from the corresponding operating system. However, careful examination reveals grammatical errors that would never occur in the real Microsoft operating system. There are also slight differences in design, style, and color from the normal Windows themes and windows.

Aliases: Win32/Cryptor [AVG], W32/FakeAV.AT!tr [Fortinet], Virus.Generic, BScope.Trojan.Cidox.02, VirusDoctor!gen12 [Symantec], a variant of Win32/Kryptik.AHQA [NOD32], Win32.SuspectCrc [Ikarus], Trojan/Buzus.anpo, Troj/Spycos-A [Sophos], TR/ATRAPS.Gen [AntiVir], Trojan.DownLoad3.8200 [DrWeb], Win32.SuspectCrc!IK, Gen:Variant.Zusy.4821 [BitDefender], Trojan.Win32.Zapchast.accf [Kaspersky] and TROJ_GEN.RC1B1FP.

Technical Information

Screenshots & Other Imagery

Tip: Turn your sound ON and watch the video in Full Screen mode to fully experience how XP Security 2012 infects a computer.

XP Security 2012 Video

XP Security 2012 Image 1 XP Security 2012 Image 2 XP Security 2012 Image 3 XP Security 2012 Image 4 XP Security 2012 Image 5 XP Security 2012 Image 6 XP Security 2012 Image 7

File System Details

XP Security 2012 creates the following file(s):
# File Name Size MD5 Detection Count
1 C:\KDownloader\AddAm\WDvdauthoe.cpl 171,417 ae0c989485969d8b48a65b7c96b5a88a 23
2 %COMMONPROGRAMFILES%\BOONTY Shared\Service\Boonty.exe 69,120 8842fabd13e8e3f1a85854aa70d15ba0 3
3 %WINDIR%\system32\config\systemprofile\AppData\Local\fjn.exe 372,224 5f4ef2db6bcaff93b96025b60ed03fae 1
4 %USERPROFILE%\Impostazioni locali\Dati applicazioni\rwh.exe 356,352 31d5dbdc23d510e4fed060c167ce06f4 1
5 %USERPROFILE%\My Documents\Downloads\U-Ch3atsSFDFI_012912.dll 582,144 1d80d09144d6e714627dbdbd55b0acfd 1
6 %SystemDrive%\Documents and Settings\Ashlyn\Application Data\Protector-lrqe.exe 2,216,960 32b652fee344c25f4bfed0ca2a472b1f 1
7 %AppData%\Local\[random].exe N/A
8 %AppData%\Roaming\Microsoft\Windows\Templates\[random] N/A
9 %AppData%\Local\[random] N/A
10 %AllUsersProfile%\[random] N/A
11 %Temp%\[random] N/A
12 setup.exe 348,160 d91454e0e028db3aad86196f404676af 0
13 install.exe 344,064 a8a1ec0be621d5e5237e5057d428640a 0
14 cht.exe 319,488 01c8cd4e532465a3a3a90137cc200ccb 0

Registry Details

XP Security 2012 creates the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Classes\.exe\DefaultIcon "(Default)" = '%1? = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%1? %*'
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command "IsolatedCommand" = '"%1? %*'
HKEY_CURRENT_USER\Software\Classes\exefile\DefaultIcon "(Default)" = '%1?
HKEY_CURRENT_USER\Software\Classes\exefile\shell\runas\command "(Default)" = '"%1? %*'
HKEY_CLASSES_ROOT\exefile\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%1? %*'
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%Program Files%\Internet Explorer\iexplore.exe"
HKEY_CURRENT_USER\Software\Classes\.exe "Content Type" = 'application/x-msdownload'
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command "(Default)" = '"%1? %*'
HKEY_CURRENT_USER\Software\Classes\exefile "Content Type" = 'application/x-msdownload'
HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command "IsolatedCommand" = '"%1? %*'
HKEY_CLASSES_ROOT\.exe\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%1? %*'
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%Program Files%\Mozilla Firefox\firefox.exe" -safe-mode'
HKEY_CURRENT_USER\Software\Classes\.exe "(Default)" = 'exefile'
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command "IsolatedCommand" = '"%1? %*'
HKEY_CURRENT_USER\Software\Classes\exefile "(Default)" = 'Application'
HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%1? %*'
HKEY_CURRENT_USER\Software\Classes\exefile\shell\runas\command "IsolatedCommand" – '"%1? %*'
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%Program Files%\Mozilla Firefox\firefox.exe"'

More Details on XP Security 2012

The following messages associated with XP Security 2012 were found:
Privacy threat!
Spyware intrusion detected. Your system is infected. System integrity is at risk. Private data can be stolen by third parties, including credit card details and passwords. Click here to perform a security repair.
Stealth intrusion!
Infection detected in the background. Your computer is now attacked by spyware and rogue software. Eliminate the infection safely, perform a security scan and deletion now.
XP Antispyware 2012 Alert
Security Hole Detected!
A program is trying to exploit Windows security holes! Passwords and sensitive data may be stolen. Do you want to block this attack?

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.