Description of Win7 Antivirus 2013
It is a variant of the Rogue.FakeRean-Braviax family of computer infections. This infection is considered a rogue anti-spyware program because it displays fake scan results, false security warnings, hijacks your web browser, and does not allow you to run your legitimate Windows applications. When your PC is infected, the messages below will be displayed: "Privacy alert! Rogue malware detected in your system. Data leaks and system damage are possible. Click here for a free security scan and spyware deletion. System hacked! Unknown program is scanning your system registry right now! Identity theft detected! Critical System Alert! Unknown software is try to take control over your system! System danger! Your system security is in danger. Privacy threats detected. Spyware, keyloggers or Trojans may be working in the background right now. Perform an in-depth scan and removal now, click here." This scareware is promoted through hacked web sites that attempt to install the software by exploiting vulnerabilities on your computer. It is also promoted through Trojans that pretend to be legitimate programs, but will install the infection instead when you run them.How to remove Win7 Antivirus 2013 step by step?
Before uninstalling the fake antivirus software, you can stop the annoying alerts by entering the following registration codes. 9443-077673-5028 3425-814615-3990 2233-298080-3424 1147-175591-6550 Step one. Reboot your computer and keep pressing F8 key when Windows launches. When see the Windows Advanced Options menu, select Safe Mode with Networking with up and down arrow keys and then press Enter key to proceed.Step two. Open Windows Task Manager by pressing Ctrl + Alt + Delete. Click Processes tab, select the random .exe associated with the infection and end it.
Step three. Delete the registry entries of the Win7 Antivirus 2013. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Interent Explorer\Main\FeatureControl\FEATURE_ERROR_PAGE_BYPASS-ZONE_CHECK_FOR_HTTPS_KB954312 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnonHTTPSToHTTPRedirect” = 0 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ system “DisableRegistrytools” = 0 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\system “DisableTasMgr” = 0 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector” HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “ID”= 0 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net”= “2012-2-17_2” HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Settings “UID”= “rudbxijemb” HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpcc.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashDisp.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\divx.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mostat.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ platin.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tapinstall.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zapsetup3001.exe
Step four. Delete the files that related to Win7 Antivirus 2013. Search for the files below and delete them all. %AppData%\NPSWF32.dll %AppData%\Protector-[rnd].exe %AppData%\result.db