Do you realize that Win 7 Home Security 2012 is actually a virus program? Of course, this application didn’t tell you about its real plans. So, we will tell you the truth – it is not what it claims of itself, not at all. Upon being installed onto your PC without your authorization, this rogue security device would tell you that it is the only right solution to help you fight against system threats. However, it is the rogue, virus and malware number one today, so there is no way how such fraudulent and fake anti-virus can assist you in virus removal. At the same time, this program would report plenty of infections during its fake system scan. Once this fabricated checkup is over the hoax would arrange the report to come up in front of you. In this report, in particular, you would be told about lots of PC problems supposedly revealed by Win 7 Home Security 2012 rogue during its fictitious system scan. The stories in advance prepared by the malware developers and built into this malady would include fake facts about many viruses, malwares, Trojans, backdoors, hacking attempts and data theft allegedly revealed by it during its imitated scan process. Then, on this ground, the scam tool would tell you that it can have all those viruses eliminated if only you share some of your earnings with them, that is, if you pay for its inexistent full version. This so-called commercial version is as useless as the trial one, being not able to detect or identify real threats and vulnerabilities. Neither will it be able to delete them. So, stay on the alert, be not misled or deceived by this pest. Keep reading this article to find out about elimination of Win 7 Home Security 2012 hoax.
The peculiarity of this virus is that it would not care at all about your own choices and preferences. In other words, it ignores your firewall setting, security barriers and other available restrictions, installing itself without your approval. This may take place via Trojan horses, malware links of social networks, or even via e-mails, especially the ones with suspicious and unsafe attachments (in particular, with *.zip, *.rar or *.exe extensions). So, be careful when you open any of them. Keep in mind that in very many cases they really contain threats and malware program installers. Win 7 Home Security 2012 rogue would also come up in front of your PC with every Windows startup. Then, upon successful launching, it would begin to perform all evil deeds and to implement its bad plot as described in the upper paragraph. Is this not enough for you to understand that Win 7 Home Security 2012 is the fake anti-virus which requires immediate removal? We hope that by now you’ve got the clear picture of what this Trojan infection really is. Now, please follow these malware removal instructions with the explanations on how to delete this rogue anti-spyware tool – http://www.2-viruses.com/remove-win-7-home-security-2012.
Win 7 Home Security 2012 system amendments:
Win 7 Home Security 2012 files added:
- %UserProfile%\Local Settings\Application Data\opRSK
- %UserProfile%\Local Settings\Application Data\pw.exe
- %UserProfile%\Local Settings\Application Data\vz.exe
- %UserProfile%\Local Settings\Application Data\MSASCui.exe
- %UserProfile%\AppData\Local\opRSK
- %UserProfile%\AppData\Local\pw.exe
- %UserProfile%\AppData\Local\vz.exe
- %UserProfile%\AppData\Local\MSASCui.exe
Win 7 Home Security 2012 registry entries added:
- HKCU\Software\Classes\pezfile
- HKCR\pezfile
- HKCU\Software\Classes\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1” %*
- HKCU\Software\Classes\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1” %*
- HKCU\Software\Classes\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “%1” %*
- HKCU\Software\Classes\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “%1” %*
- HKCR\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1” %*
- HKCR\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1” %*
- HKCR\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “%1” %*
- HKCR\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “%1” %*
- HKLM\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe”
- HKLM\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe” -safe-mode
- HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “C:\Program Files\Internet Explorer\iexplore.exe”
- HKLM\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe”
- HKLM\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe” -safe-mode
- HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “C:\Program Files\Internet Explorer\iexplore.exe”
- HKLM\SOFTWARE\Microsoft\Security Center “AntiVirusOverride” = “1”
- HKLM\SOFTWARE\Microsoft\Security Center “FirewallOverride” = “1”