Click on screenshot to zoom
Danger level 9
Type: Rogue Anti-Spyware
Common infection symptoms:
  • Blocks internet connection
  • Block exe files from running
  • Installs itself without permissions
  • Connects to the internet without permission
  • Normal system programs crash immediatelly
  • Slow internet connection
  • System crashes
  • Annoying Pop-up's
  • Slow Computer
Other mutations known as:

Vista Security 2013

Vista Security 2013 comes from a bunch of rogue infections that uses the same mold for every single threat - basically Vista Security 2013 takes its name only when it gets into your computer, because the rogue's title depends on your operating system. Therefore, if you have Windows Vista and you get infected with this rogue, you will Vista Security 2013's interface pop up into your desktop. It is a new variant of Vista Defender 2013 that appeared a few weeks ago, and a whole horde of other similar infections like Vista Security 2012, Vista Defender 2012 and so on that came in an onslaught more than 6 months ago.

Either way, the user has to realize that Vista Security 2013 is a fake antivirus program and it cannot help him or her to deal with computer infections. After all, it is a computer infection itself and it causes a lot problems in order to reach its main goal - your money. For example, Vista Security 2013 can block your executable programs and even access to particular websites. It tampers with your programs and your Internet so that you would not be able to remove Vista Security 2013 from your computer. For example, the rogue might block you from accessing security-related websites.

On top of that, Vista Security 2013 also spams you with tons of fake security messages. These notifications pop up at your taskbar and they try to convince you that you have serious viruses in your system:

Privacy threat!
Spyware intrusion detected. Your system is infected. System integrity is at risk. Private data can be stolen by third parties, including credit card details and passwords. Click here to perform a security repair.

Malware Intrusion
Sensitive areas of your system were found to be under attack. Spy software attack or virus infection possible. Prevent further damage or your private data will get stolen. Run an anti-spyware scan now. Click here to start.

Vista Security 2013 Firewall Alert
Vista Security 2013 has blocked a program from accessing the internet
Internet Explorer is infected with Trojan-BNK.Win32.Keylogger.gen
Private data can be stolen by third parties, including credit card details and passwords.

Actually most of the threats Vista Security 2013 warns you about are caused by the rogue itself. Therefore, it is more than obvious that Vista Security 2013 cannot be trusted, especially as the only thing it wants is your money. The best way to outsmart this rogue is to register it with this activation code:


After manual registration, your system should go back to normal for a while - you will no longer see the fake notifications and your programs will not be blocked. However, this is no time to relax, because you still need to remove Vista Security 2013 from your computer. There is a list of files and process that you need to delete and terminate below this description, but if you cannot perform manual rogue removal you should get yourself a powerful antimalware tool and remove Vista Security 2013 with it automatically. The security program will also help you to protect your system from similar threats.

Download Spyware Removal Tool to Remove* Vista Security 2013
  • Quick & tested solution for Vista Security 2013 removal.
  • 100% Free Scan for Windows

How to manually remove Vista Security 2013

Files associated with Vista Security 2013 infection:


Vista Security 2013 processes to kill:


Remove Vista Security 2013 registry entries:

HKEY_CURRENT_USERSoftwareClasses.exe [Random]
HKEY_CURRENT_USERSoftwareClasses.exeContent Type application/x-msdownload
HKEY_CURRENT_USERSoftwareClasses.exeDefaultIcon %1
HKEY_CURRENT_USERSoftwareClasses.exeshellopencommand “[Random].exe” -a “%1? %*
HKEY_CURRENT_USERSoftwareClasses.exeshellopencommandIsolatedCommand “%1? %*
HKEY_CURRENT_USERSoftwareClasses.exeshellrunascommand “%1? %*
HKEY_CURRENT_USERSoftwareClasses.exeshellrunascommandIsolatedCommand “%1? %*
HKEY_CURRENT_USERSoftwareClasses[Random] Application
HKEY_CURRENT_USERSoftwareClasses[Random]Content Type application/x-msdownload
HKEY_CURRENT_USERSoftwareClasses[Random]DefaultIcon %1
HKEY_CURRENT_USERSoftwareClasses[Random]shellopencommand “[Random].exe” -a “%1? %*
HKEY_CURRENT_USERSoftwareClasses[Random]shellopencommandIsolatedCommand “%1? %*
HKEY_CURRENT_USERSoftwareClasses[Random]shellrunascommand “%1? %*
HKEY_CURRENT_USERSoftwareClasses[Random]shellrunascommandIsolatedCommand “%1? %*

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.