XP Security 2012

By Domesticus in Rogue Anti-Spyware Program

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 41
First Seen: August 9, 2011
Last Seen: November 10, 2020
OS(es) Affected: Windows

XP Security 2012 Image

In the year 2011, the Internet was flooded with dozens of versions of the malicious file Ppn.exe. XP Security 2012 is one of the many different faces of this harmful file. Every day there are new names and skins for the Ppn.exe process, making it quite difficult for security experts to keep track of the exact number of disguises this shifty file can use.

How XP Security 2012 Tries to Trick You

XP Security 2012 is part of a scam that tries to trick users into thinking that their computer is infected by any number of viruses and spyware. In fact, XP Security 2012 is in itself a malicious security program. XP Security 2012 is designed to disrupt the computer's normal operation and then to scare the user into paying to remove XP Security 2012. This kind of rogue anti-spyware application is known as scareware. XP Security 2012 basic way of working is by disrupting your computer, then running a fake scan, and then disguising itself as a legitimate security application. This rogue security application will then demand that the scared user enter his credit card information to get rid of the supposed virus attack.

What Makes XP Security 2012 Unique?

While the most common rogue anti-spyware applications that came before Ppn.exe could have dozens of clones (differently named copies of the same program,) XP Security 2012 and other versions of Ppn.exe are not technically clones. All of the different versions of Ppn.exe are the same program, with different names and skins to match the user's operating system. That means that a computer user using Windows Vista would not become infected with XP Security 2012 but rather with a version of Ppn.exe specific for Windows Vista. This version of Ppn.exe could be called Vista Security 2012, or any other number of names that make XP Security 2012 seem a legitimate Windows Vista security application.

How Does Ppn.exe Adapt to an Operating System?

Ppn.exe is acquired through a Trojan, a harmful bit of code that uses known security vulnerabilities to enter a computer and deliver XP Security 2012's dangerous payload. The first sign of the Trojan intrusion is a fake notification from the fake Windows Automatic Update which is used to install XP Security 2012. When Ppn.exe has been is been installed, it checks for the user's operating system and downloads skins corresponding to that operating system. There are three sets of skins, each containing a huge amount of possible versions of Ppn.exe with new ones being created each day. There is a Windows XP set, a Windows Vista set, and a Windows 7 set. This version of Ppn.exe, XP Security 2012, is part of the Windows XP set. Similar skins from the other two sets would be named Vista Security 2012 and Windows 7 Security 2012 or Win 7 Security 2012. The skins are designed to look similar to the normal windows and themes from the corresponding operating system. However, careful examination reveals grammatical errors that would never occur in the real Microsoft operating system. There are also slight differences in design, style, and color from the normal Windows themes and windows.ScreenshotScreenshotScreenshotScreenshotScreenshotScreenshotScreenshot


15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
AVG Win32/Cryptor
Fortinet W32/FakeAV.AT!tr
Symantec VirusDoctor!gen12
NOD32 a variant of Win32/Kryptik.AHQA
Ikarus Win32.SuspectCrc
Sophos Troj/Spycos-A
DrWeb Trojan.DownLoad3.8200
BitDefender Gen:Variant.Zusy.4821
Kaspersky Trojan.Win32.Zapchast.accf
Sophos NirCmd
ClamAV PUA.Packed.PECompact-1
eSafe Win32.Tool.NirCmd
McAfee Artemis!22C79223CAB4
Panda Generic Trojan

SpyHunter Detects & Remove XP Security 2012

XP Security 2012 Video

Tip: Turn your sound ON and watch the video in Full Screen mode.

File System Details

XP Security 2012 may create the following file(s):
# File Name MD5 Detections
1. WDvdauthoe.cpl ae0c989485969d8b48a65b7c96b5a88a 23
2. Boonty.exe 8842fabd13e8e3f1a85854aa70d15ba0 3
3. fjn.exe 5f4ef2db6bcaff93b96025b60ed03fae 1
4. rwh.exe 31d5dbdc23d510e4fed060c167ce06f4 1
5. U-Ch3atsSFDFI_012912.dll 1d80d09144d6e714627dbdbd55b0acfd 1
6. Protector-lrqe.exe 32b652fee344c25f4bfed0ca2a472b1f 1
7. %AppData%\Local\[random].exe
8. %AppData%\Roaming\Microsoft\Windows\Templates\[random]
9. %AppData%\Local\[random]
10. %AllUsersProfile%\[random]
11. %Temp%\[random]
12. setup.exe d91454e0e028db3aad86196f404676af 0
13. install.exe a8a1ec0be621d5e5237e5057d428640a 0
14. cht.exe 01c8cd4e532465a3a3a90137cc200ccb 0

Registry Details

XP Security 2012 may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Classes\.exe\DefaultIcon "(Default)" = '%1? = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%1? %*'
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command "IsolatedCommand" = '"%1? %*'
HKEY_CURRENT_USER\Software\Classes\exefile\DefaultIcon "(Default)" = '%1?
HKEY_CURRENT_USER\Software\Classes\exefile\shell\runas\command "(Default)" = '"%1? %*'
HKEY_CLASSES_ROOT\exefile\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%1? %*'
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%Program Files%\Internet Explorer\iexplore.exe"
HKEY_CURRENT_USER\Software\Classes\.exe "Content Type" = 'application/x-msdownload'
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command "(Default)" = '"%1? %*'
HKEY_CURRENT_USER\Software\Classes\exefile "Content Type" = 'application/x-msdownload'
HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command "IsolatedCommand" = '"%1? %*'
HKEY_CLASSES_ROOT\.exe\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%1? %*'
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%Program Files%\Mozilla Firefox\firefox.exe" -safe-mode'
HKEY_CURRENT_USER\Software\Classes\.exe "(Default)" = 'exefile'
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command "IsolatedCommand" = '"%1? %*'
HKEY_CURRENT_USER\Software\Classes\exefile "(Default)" = 'Application'
HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%1? %*'
HKEY_CURRENT_USER\Software\Classes\exefile\shell\runas\command "IsolatedCommand" – '"%1? %*'
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[random].exe" /START "%Program Files%\Mozilla Firefox\firefox.exe"'


The following messages associated with XP Security 2012 were found:

Privacy threat!
Spyware intrusion detected. Your system is infected. System integrity is at risk. Private data can be stolen by third parties, including credit card details and passwords. Click here to perform a security repair.
Stealth intrusion!
Infection detected in the background. Your computer is now attacked by spyware and rogue software. Eliminate the infection safely, perform a security scan and deletion now.
XP Antispyware 2012 Alert
Security Hole Detected!
A program is trying to exploit Windows security holes! Passwords and sensitive data may be stolen. Do you want to block this attack?


Most Viewed