Threat Database Rogue Anti-Spyware Program Win 7 Home Security Pro 2013

Win 7 Home Security Pro 2013

By ESGI Advisor in Rogue Anti-Spyware Program

Threat Scorecard

Ranking: 16,453
Threat Level: 20 % (Normal)
Infected Computers: 741
First Seen: December 17, 2012
Last Seen: September 6, 2023
OS(es) Affected: Windows

Win 7 Home Security Pro 2013 is a fake anti-spyware program that looks like a genuine security tool but, in reality, it cannot detect and remove any type of security threats. Win 7 Home Security Pro 2013 is delivered through the use of Trojans and other malware infections that use security vulnerabilities detected to download and install Win 7 Home Security Pro 2013 without a PC user's consent and knowledge. When Win 7 Home Security Pro 2013 is installed on the targeted computer system, it will start automatically when you boot up Windows and then perform a false system scan on the PC. Win 7 Home Security Pro 2013 will return falsified PC scan results in order to scare the affected user that his/her computer has been corrupted by numerous malware threats. Win 7 Home Security Pro 2013 will display fabricated pop-up security alerts, which also indicate certain PC problems and security issues. Win 7 Home Security Pro 2013 will recommend the victim to buy the imaginary full version of its fake software product, which is worthless just like the trial version, in order to uninstall all supposedly detected malware threats. ESG's malware analysts highly recommend you not to purchase Win 7 Home Security Pro 2013 as it is a malicious security tool. You should use a legal anti-malware program in order to rid your computer of Win 7 Home Security Pro 2013.

File System Details

Win 7 Home Security Pro 2013 may create the following file(s):
# File Name Detections
1. %CommonApplData%\[RANDOM CHARACTERS_2]
2. %LocalAppData%\[RANDOM CHARACTERS_2]
3. %Temp%\[RANDOM CHARACTERS_2]
4. %UserProfile%\Templates\[RANDOM CHARACTERS_2]

Registry Details

Win 7 Home Security Pro 2013 may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Classes\.exe\ [RANDOM CHARACTERS_0]
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command\IsolatedCommand ?%1""%*
HKEY_CURRENT_USER\Software\Classes\.exe\DefaultIcon\ %1
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\ Application
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command\ ?%1" %*
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\DefaultIcon
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\DefaultIcon\ %1
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\shell\runas\command\IsolatedCommand ?%1" %*
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\shell\runas
HKEY_CURRENT_USER\Software\Classes\.exe\Content Type application/x-msdownload
HKEY_CURRENT_USER\Software\Classes\.exe\shell
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command\ ?[RANDOM CHARACTERS_1].exe? -a ?%1" %*
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\shell\open
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\shell
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\shell\runas\command\ ?%1" %*
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\shell\runas\command
HKEY_CURRENT_USER\Software\Classes\.exe\DefaultIcon
HKEY_CURRENT_USER\Software\Classes\.exe
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\Content Type application/x-msdownload
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command\IsolatedCommand ?%1" %*
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\shell\open\command\IsolatedCommand ?%1" %*
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\shell\open\command\ ?[RANDOM CHARACTERS_1].exe? -a ?%1" %*
HKEY_CURRENT_USER\Software\Classes\[RANDOM CHARACTERS_0]\shell\open\command

URLs

Win 7 Home Security Pro 2013 may call the following URLs:

groinmonsieur.com

Trending

Most Viewed

Loading...