Home Malware Programs Rogue Anti-Spyware Programs XP Antispyware 2012

XP Antispyware 2012

Posted: June 8, 2011

Threat Metric

Threat Level: 10/10
Infected PCs: 12
First Seen: August 9, 2011
OS(es) Affected: Windows

ScreenshotXP Anti-Spyware 2012 is a fake anti-spyware program that's a copy of other threats like Vista Anti-Spyware 2012. Like its kin, XP Anti-Spyware 2012 will block programs and hijack web browsing applications, while creating fake infection warnings instead of implementing real security features. Purchasing XP Anti-Spyware 2012 is strongly discouraged since XP Anti-Spyware 2012 has no positive features, and is designed strictly to steal money and credit card information. Removing XP Anti-Spyware 2012 with the proper use of real anti-malware software will also neutralize all XP Anti-Spyware 2012-related attacks.

XP Anti-Spyware 2012 Illusory Security Capabilities

As is the case with most types of rogue security programs, XP Anti-Spyware 2012 doesn't bother to implement any real threat detection functions; XP Anti-Spyware 2012 simply creates fake errors instead that warn you about serious threats, often located in critical programs like your anti-virus scanners and basic Windows applications. XP Anti-Spyware 2012 infection warnings can take the form of false system scans or pop-up alerts that appear semi-randomly.

Some of fake XP Anti-Spyware 2012 alert pop-ups that you might see are:

System warning!
Continue working in unprotected mode is very dangerous. Viruses can damage your confidential data and work on your computer. Click here to protect your computer.

System warning!
Security Essentials Ultimate Pack software detects programs that may compromise your privacy and harm your systems. It is highly recommended you scan your PC right now. Click here to start.

Security Alert!
Your computer is being attacked from a remote machine !
Block Internet access to your computer to prevent system infection.

Critical Warning!
Critical System Warning! Your system is probably infected with a version of Trojan-Spy.HTML.Visafraud.a. This may result in website access passwords being stolen from Internet Explorer, Mozilla Firefox, Outlook etc. Click Yes to scan and remove threats. (recommended)

XP Anti-Spyware 2012 will continue to pester you with fake warnings like these, while telling you that the only way to stop these threats is to purchase a registered version of XP Anti-Spyware 2012. Since XP Anti-Spyware 2012 neither detects nor removes PC threats like Trojans and worms, you can save your money.

The Real Danger Behind XP Anti-Spyware 2012's Illusion

XP Anti-Spyware 2012 is also able to create genuine problems for your PC, to make it look like different infections are interfering with your computer's operation. Known XP Anti-Spyware 2012 attacks include program-blocking and browser-hijacking.

Program-blocking attacks will often be combined with XP Anti-Spyware 2012's fake errors, to give the appearance of the program crashing because of an infection. The truth, however, is that XP Anti-Spyware 2012 is deliberately blocking the program, and you'll be able to run the application after preventing XP Anti-Spyware 2012 from loading during the Windows startup routine.

XP Anti-Spyware 2012's hijacks will use a variety of methods to redirect you to malicious websites, including changing your homepage settings and altering your results in search engines. More dangerously, XP Anti-Spyware 2012 can also use hijacks to stop you from visiting any website it doesn't want you to see, including security-oriented domains. This can include the use of fake website error pages that usually contain links back to XP Anti-Spyware 2012's own site.

Manual attempts to undo XP Anti-Spyware 2012 browser setting changes or other browser-related attacks will usually fail, since XP Anti-Spyware 2012 will simply remake the changes once you close the application or reboot. Removing XP Anti-Spyware 2012 itself is generally required before you can permanently stop any of the changes that have been made to your browser.

To remove XP Anti-Spyware 2012 with the greatest chance of success, you should first stop XP Anti-Spyware 2012 from launching by booting from a CD or using Safe Mode. Using security software to delete XP Anti-Spyware 2012 is strongly advised, since XP Anti-Spyware 2012 has advanced components that can harm your PC if removed improperly.

ScreenshotScreenshotScreenshotScreenshotScreenshot

Aliases

Suspicious file [Panda]UDS:DangerousObject.Multi.Generic [Kaspersky]a variant of Win32/Kryptik.RGL [NOD32]Trj/CI.A [Panda]FakeAlert.AFC [AVG]W32/FakeAV.JR!tr [Fortinet]Trojan.Fakealert [Ikarus]Trojan/Win32.FakeAV [AhnLab-V3]Rogue:Win32/FakeRean [Microsoft]Mal/FakeAV-JR [Sophos]TR/Gendal.KD.296525 [AntiVir]Trojan.Fakealert.22773 [DrWeb]TrojWare.Win32.Trojan.Agent.Gen [Comodo]Trojan.Generic.KD.296525 [BitDefender]Trojan.Win32.FakeAV.eaex [Kaspersky]
More aliases (26)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%USERPROFILE%\Configuraci??n local\Datos de programa\cuw.exe File name: cuw.exe
Size: 344.06 KB (344064 bytes)
MD5: 6c036a1a0b3b25b83fbea52f332c69d5
Detection count: 58
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Configuraci??n local\Datos de programa
Group: Malware file
Last Updated: August 9, 2011
%WINDIR%\system32\config\systemprofile\AppData\Local\sae.exe File name: sae.exe
Size: 335.87 KB (335872 bytes)
MD5: 1a54aff914485e76e7d51bf488e186e5
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32\config\systemprofile\AppData\Local
Group: Malware file
Last Updated: August 9, 2011
%LOCALAPPDATA%\lmk.exe File name: lmk.exe
Size: 532.48 KB (532480 bytes)
MD5: fbcbd2aba5d5aff5c8d1cd93fe304204
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: August 9, 2011
dls.exe File name: dls.exe
Size: 2.28 MB (2281472 bytes)
MD5: 0ddd81708871ad2bf1e241f07c774647
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: August 9, 2011
xkj.exe File name: xkj.exe
Size: 348.16 KB (348160 bytes)
MD5: 7c095640bc204e19c44fa40d9a00d58a
Detection count: 4
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: August 9, 2011
%AllUsersProfile%\[RANDOM CHARACTERS] File name: %AllUsersProfile%\[RANDOM CHARACTERS]
Group: Malware file
%AppData%\Local\[RANDOM CHARACTERS] File name: %AppData%\Local\[RANDOM CHARACTERS]
Group: Malware file
%AppData%\Local\[RANDOM CHARACTERS].exe File name: %AppData%\Local\[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\Roaming\Microsoft\Windows\Templates\[rRANDOM CHARACTERS] File name: %AppData%\Roaming\Microsoft\Windows\Templates\[rRANDOM CHARACTERS]
Group: Malware file
%Temp%\[RANDOM CHARACTERS] File name: %Temp%\[RANDOM CHARACTERS]
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Classes\.exe "(Default)" = 'exefile'HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command "IsolatedCommand" = '"%1" %*'HKEY_CURRENT_USER\Software\Classes\.exe "Content Type" = 'application/x-msdownload'HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command "(Default)" = '"%1" %*'HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command "IsolatedCommand" = '"%1" %*'HKEY_CURRENT_USER\Software\Classes\.exe\DefaultIcon "(Default)" = '%1" = '"%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe" /START "%1" %*'HKEY_CURRENT_USER\Software\Classes\exefile "(Default)" = 'Application'HKEY_CURRENT_USER\Software\Classes\exefile "Content Type" = 'application/x-msdownload'HKEY_CURRENT_USER\Software\Classes\exefile\DefaultIcon "(Default)" = '%1'HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command "IsolatedCommand" = '"%1" %*'HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe" /START "%1" %*'HKEY_CURRENT_USER\Software\Classes\exefile\shell\runas\command "(Default)" = '"%1" %*'HKEY_CURRENT_USER\Software\Classes\exefile\shell\runas\command "IsolatedCommand" – '"%1" %*'HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe" /START "%Program Files%\Mozilla Firefox\firefox.exe"'HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe" /START "%Program Files%\Internet Explorer\iexplore.exe"HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe" /START "%Program Files%\Mozilla Firefox\firefox.exe" -safe-mode'HKEY..\..\..\..{RegistryKeys}HKEY_CLASSES_ROOT\.exe\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe" /START "%1" %*'HKEY_CLASSES_ROOT\exefile\shell\open\command "(Default)" = '"%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe" /START "%1" %*'

Additional Information

The following messages's were detected:
# Message
1Malware Intrusion Sensitive areas of your system were found to be under attack. Spy software attack or virus infection possible. Prevent further damage or your private data will get stolen. Run an anti-spyware scan now. Click here to start
2Privacy threat! Spyware intrusion detected. Your system is infected. System integrity is at risk. Private data can be stolen by third parties, including credit card details and passwords. Click here to perform a security repair.
3Stealth intrusion! Infection detected in the background. Your computer is now attacked by spyware and rogue software. Eliminate the infection safely, perform a security scan and deletion now.
4System Hijack! System security threat was detected. Viruses and/or spyware may be damaging your system now. Prevent infection and data loss or stealing by running a free security scan.
5System danger! Your system security is in danger. Privacy threats detected. Spyware, keyloggers or Trojans may be working the background right now. Perform an in-depth scan and removal now, click here
6XP Antispyware 2012 Alert Security Hole Detected! A program is trying to exploit Windows security holes! Passwords and sensitive data may be stolen. Do you want to block this attack?
7XP Antispyware 2012 Firewall Alert XP Home Security 2012 has blocked a program from accessing the internet Internet Explorer is infected with Trojan-BNK.Win32.Keylogger.gen Private data can be stolen by third parties, including credit card details and passwords.

9 Comments

  • hedayat says:

    I've tried downloading this file. but it does not
    when I click run then comes, XP Antispyware 2012 that I should register and then I can downloading.
    can you help me please

  • brad says:

    change the exe to scr extension
    u must open my computer
    go to folder options
    select show extensions
    then rename file to .scr instead of .exe

  • SF says:

    this virus actually won't allow me to open system, add/remove programs, automatic updates on my control panel.

  • SF says:

    this virus won't allow me to access control panel, add/remove programs, system restore, etc.
    I also noticed recently that i was receiving e-mails from people mentioned in e-mails that i sent via hotmail, i.e., it was spam. i'm wondering if this virus is part of that. (one person i had mentioned in e-mail and then who i received e-mail from, she passed away about a decade ago, and had never used e-mail).

  • Freddy J says:

    at first i could not access most site and could not download your spyhunter. I tired the alt link: https://www.enigmasoftware.com/SpyHunter-Installer.com and that was the trick! you guys rock. SF, you may need to try this link to download the program so you can detect and remove XP Antispyware 2012.

  • Chris Meyers says:

    THis saved me a trip to Best Buy geek squad. I was about to just have them fix this XP Antispyware 2012 bug. It would not let me go online to the internet at all. Thanks for being honest.

  • mario says:

    I was listening to a radio program when this thing pop up. Not even my own anti virus software could load. I couldn't even open up wordpad. I found your site and started in safe mode which does not allow the xp program to load. Then I set the system to restore for a month earlier. The computer now works again and my anti virus software removed any remaining infected files and the boot log scan removed all the infected files as well. Just turn on the computer, press enter when prompted and then choose safe mode.

  • Sumiko Jauron says:

    I have been a little nervous about modifying the registry on my Windows Vista computer to remove entries associated with viruses and spyware. It would be wonderful to locate an automatic program that could remove the entries from your registry on auto-pilot. Any tips?

  • alayna says:

    Use this on home computer and it works great!

Loading...