Perfect Antivirus 2012
Posted: March 19, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 41 |
First Seen: | March 19, 2012 |
---|---|
OS(es) Affected: | Windows |
Perfect Antivirus 2012 is a rogue anti-virus application that's marketed at raxco.com and similar sites via fake infection warnings. Because Perfect Antivirus 2012 is a very new example of scamware with developers who have conducted a deliberate misinformation campaign, many PC security companies have yet to identify Perfect Antivirus 2012 as a threat to your computer. In spite of this and its strong resemblance to the unrelated and legitimate Bitdefender Antivirus brand, Perfect Antivirus 2012 should be considered a danger without any accurate system analysis or threat detection information to provide. SpywareRemove.com malware researchers recommend that you remove Perfect Antivirus 2012 as soon as you can use appropriate anti-malware software, since rogue AV programs like Perfect Antivirus 2012 may also create security hazards that make your computer exceptionally vulnerable to other attacks.
A Tally of Perfect Antivirus 2012's Shortcomings as AV Software
Perfect Antivirus 2012, as an interface rip-off of legitimate software, looks like a reputable program on the outside. This also extends to the offhand appearance of its security features, which include the warning messages and system scans that are common to most types of rogue anti-virus programs. Unfortunately, your chances of seeing real warning messages that are accurate to your computer's health are slim, since SpywareRemove.com malware experts haven't found any signs of Perfect Antivirus 2012 having genuine threat detection functions. Warning messages such as application infection pop-ups or system errors that are associated with Perfect Antivirus 2012 should always be ignored, and following their recommendations may even damage your PC.
As is usually true of fake anti-virus products, SpywareRemove.com malware analysts have also noted that Perfect Antivirus 2012 alters the Windows Registry to insure its own automatic startup. This allows Perfect Antivirus 2012 to display its fake security information continually and may also be used to block legitimate anti-malware applications that could delete Perfect Antivirus 2012. Turning Perfect Antivirus 2012 off is the best way to start any attempt to resolve a Perfect Antivirus 2012 infection, and can be accomplished by using secure boot options (such as booting from a USB device or using Safe Mode).
Being Better Than Perfect Antivirus 2012's Poor Efforts at Antivirus Features
Perfect Antivirus 2012 is distributed by malicious websites, usually along with suggestive warnings that imply that you should download Perfect Antivirus 2012 to cure a nonexistent infection on your computer. In light of this, SpywareRemove.com malware research team stresses the importance of only using trustworthy anti-malware products, as well as avoiding questionable software recommendations from suspicious websites. Deleting Perfect Antivirus 2012, once Perfect Antivirus 2012 is disabled, is also something that should be left to your appropriate security software, since Perfect Antivirus 2012 will modify the Windows Registry and make other system changes that are difficult to undo without advanced anti-malware assistance.
As a very recent PC threat with a marketing campaign that began in early March 2012, Perfect Antivirus 2012 may be able to avoid anti-malware scanners that aren't using recent threat databases. Whenever possible, patching your anti-malware software to use its most recent database is recommended before you remove Perfect Antivirus 2012, to insure total detection of all malicious components.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%CommonAppData%\<random 33 characters>\<random 33 characters>.exe
File name: %CommonAppData%\<random 33 characters>\<random 33 characters>.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
%CommonAppData%\<random 33 characters>\<random 33 characters>
File name: %CommonAppData%\<random 33 characters>\<random 33 characters>Group: Malware file
%CommonAppData%\<random 33 characters>
File name: %CommonAppData%\<random 33 characters>Group: Malware file
Registry Modifications
HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce "
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.