Win 7 Home Security 2013
Posted: October 8, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 15 |
First Seen: | October 8, 2012 |
---|---|
OS(es) Affected: | Windows |
Win 7 Home Security 2013 is a fake anti-malware program that displays inaccurate security information to make your computer appear as though it's heavily-infected with dozens of types of malware. Because Win 7 Home Security 2013 looks like an actual anti-malware product and may be installed by malicious sites that recommend Win 7 Home Security 2013 as security software, victims may be unaware of Win 7 Home Security 2013's true nature and spend unnecessary money on a registration fee. Nonetheless, SpywareRemove.com malware researchers have long since confirmed that Win 7 Home Security 2013 can't detect or delete PC threats regardless of whether or not you pay for Win 7 Home Security 2013. Like any member of FakeRean, Win 7 Home Security 2013 should be removed with a legitimate anti-malware application instead of trusted, particularly since Win 7 Home Security 2013 may block vital security features for the Windows OS.
Win 7 Home Security 2013: Making Itself at Home in the Worst Ways Possible
Win 7 Home Security 2013 is a reskin of similar PC threats from its particular branch of the FakeRean family, a collection of rogue anti-malware applications that share similar attack traits and appearances. Besides its name and a new color to its interface, Win 7 Home Security 2013 is identical to scamware programs like Antivirus 2008 Pro, Antivirus XP 2008, Windows Antivirus 2008, Vista Antivirus 2008, PC Clean Pro, Antivirus Pro 2009, Rogue.Vista Antivirus 2008, AntiSpy Safeguard, ThinkPoint, Spyware Protection 2010, Internet Antivirus 2011, Palladium Pro, XP Anti-Virus 2011, CleanThis, XP Security 2012, XP Home Security 2012 and AntiVirus PRO 2015. However, SpywareRemove.com malware analysts have noted that other members of the FakeRean family may include significant variations in both appearance and attacks, although they will still try to appear as some form of ostensibly-functional anti-malware scanner.
In keeping with its artifice of having security features, Win 7 Home Security 2013 includes many types of pop-up alerts, all of which warn you about erroneous infections. SpywareRemove.com malware experts have found that the majority of these announce high-level threats, such as backdoor Trojans, keyloggers, advanced spyware attacks and attacks against Windows components – all intended to make a victim throw money at Win 7 Home Security 2013 in hopes of making these threats vanish. Similarly, scans by Win 7 Home Security 2013 include large lists of fake malware infections that always should be considered inaccurate, as well as and potentially harmful to your PC (if you attempt to delete a supposedly infected file).
While Win 7 Home Security 2013 leverages its marketing scam effectively, you should never feel the need to purchase Win 7 Home Security 2013, as any problems with your PC actually are caused by Win 7 Home Security 2013 or associated PC threats. However, if you wish to use a freely-circulated registration key to fake Win 7 Home Security 2013's registration prior to removing Win 7 Home Security 2013 entirely, SpywareRemove.com malware researchers have found such tactics to be safe and potentially helpful.
Win 7 Home Security 2013's Bounty of Dangerous 'Security' Features
As you've probably guessed by now, Win 7 Home Security 2013 doesn't have any real security features, but Win 7 Home Security 2013 may make additional attacks that hinder your PC's safety under the guise of protecting it. Attacks that SpywareRemove.com malware experts have noted as both particularly likely and especially hazardous to your computer's safety include:
- Browser hijacks that block other websites by redirecting you to fake error pages. This attack can function in all major browsers.
- Registry changes that force Win 7 Home Security 2013 to launch before you're able to open any EXE file. This allows Win 7 Home Security 2013 to block programs with fake warning messages.
- Additional Registry changes that disable Windows features like the firewall, Security Center, Windows Defender or update management.
Since these attacks compromise your computer's safety to the extreme, SpywareRemove.com malware researchers recommend removing Win 7 Home Security 2013 with anti-malware software ASAP. In cases of Win 7 Home Security 2013 blocking your preferred anti-malware program, you can disable Win 7 Home Security 2013 by booting from a USB device or Safe Mode.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%AppData%\Roaming\Microsoft\Windows\Templates\[RANDOM CHARACTERS].exe
File name: %AppData%\Roaming\Microsoft\Windows\Templates\[RANDOM CHARACTERS].exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
%CommonAppData%\[RANDOM CHARACTERS].exe
File name: %CommonAppData%\[RANDOM CHARACTERS].exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
%LocalAppData%\[RANDOM CHARACTERS].exe
File name: %LocalAppData%\[RANDOM CHARACTERS].exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Temp%\[RANDOM CHARACTERS].exe
File name: %Temp%\[RANDOM CHARACTERS].exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
%UserProfile%\Desktop\Win 7 Home Security 2013.lnk
File name: %UserProfile%\Desktop\Win 7 Home Security 2013.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%UserProfile%\Start Menu\Programs\Win 7 Home Security 2013\
File name: %UserProfile%\Start Menu\Programs\Win 7 Home Security 2013\Group: Malware file
%UserProfile%\Start Menu\Programs\Win 7 Home Security 2013\Uninstall Win 7 Home Security 2013.lnk
File name: %UserProfile%\Start Menu\Programs\Win 7 Home Security 2013\Uninstall Win 7 Home Security 2013.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%UserProfile%\Start Menu\Programs\Win 7 Home Security 2013\Win 7 Home Security 2013.lnk
File name: %UserProfile%\Start Menu\Programs\Win 7 Home Security 2013\Win 7 Home Security 2013.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
Registry Modifications
HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*HKEY_CURRENT_USER\Software\Classes\.exe "(Default)" = ''HKEY_CURRENT_USER\Software\Classes\ "(Default)" = 'Application'HKEY_CURRENT_USER\Software\Classes\\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*HKEY_CURRENT_USER\Software\Classes\\DefaultIcon "(Default)" = '%1'HKEY_CLASSES_ROOT\ah\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*HKEY_CLASSES_ROOT\.exe\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command "(Default)" = ""%LocalAppData%\.exe" -a "C:\Program Files\Internet Explorer\iexplore.exe""HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command "(Default)" = ""%LocalAppData%\.exe" -a "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode"HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command "(Default)" = ""%LocalAppData%\.exe -a "C:\Program Files\Mozilla Firefox\firefox.exe""HKEY..\..\..\..{Subkeys}HKEY_CLASSES_ROOT\ah\shell\open\command "IsolatedCommand"
Additional Information
# | Message |
---|---|
1 | Privacy alert! Rogue malware detected in your system. Data leaks and system damage are possible. Click here for a free security scan and spyware deletion. |
2 | Privacy threat! Spyware intrusion detected. Your system is infected. System integrity is at risk. Private data can be stolen by third parties, including credit card details and passwords. Click here to perform a security repair. |
3 | Virus infection! System security was found to be compromised. Your computer is now infected. Attention, irreversible system changes may occur. Private data may get stolen. Click here now for an instant anti-virus scan. |
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.