Click on screenshot to zoom
Danger level 9
Type: Rogue Anti-Spyware
Common infection symptoms:
  • Blocks internet connection
  • Block exe files from running
  • Installs itself without permissions
  • Connects to the internet without permission
  • Slow internet connection
  • System crashes
  • Annoying Pop-up's
  • Slow Computer

Win 7 Anti-Virus 2013

Is Win 7 Anti-Virus 2013 running on your operating Windows system and restricting you to run the computer the way you want? This irritating activity is not surprising due to the fact that this application is actually a fake anti-virus tool which you need to remove as soon as possible. Do you think that the application belongs to Microsoft and you can trust it? This is not true, and you have to accept the interface of the rogue as misleading and fictitious. Pay no attention to seemingly legitimate Windows logo or mimicked interface display and delete Win 7 Anti-Virus 2013 from your computer. Do you know how to remove the rogue security tool from your PC? Continue reading to find out.

Win 7 Anti-Virus 2013 is a cunning infection which is extremely dangerous to Windows users who have not installed reliable security tools to fight and delete malicious components. Despite this, the infection is no news to PC security experts. This is because it comes from a vast family of Braviax rogue software. You may have heard of Win 7 Antivirus Pro 2013, Win 7 Defender 2013 and other similar programs, all of which target specific Windows versions and which are represented with the same symptoms and interfaces. The new version of the rogue has a slightly different interface; however, it does not look too far from the original which actually copies the authentic Windows Defender.

The interface of the infection is filled with highly misleading information. You should ignore the computer scanner rushing you to “Remove All” infections (e.g. DoS.Win32.DieWar) or warnings about disabled Firewall. Additionally, you should ignore the deceitful pop-up alerts (see below) which you will not be able to remove unless you delete Win 7 Anti-Virus 2013.

Malware intrusion!
Sensitive areas of your system ware found to be under attack. Spy software attack or virus infection possible. Prevent further damage or your private data will get stolen. Run an anti-spyware scan now. Click here to start.

Braviax family rogues have been witnessed to block Internet Explorer and Mozilla Firefox browsers, remove access to Task Manager and Registry Editor or disrupt the running of most executable files. Surely, this makes manual Win 7 Anti-Virus 2013 removal impracticable. Regardless, you should not panic and pay money for the full version of the fake AV tool, which is the main objective of schemers standing behind the infection. Instead you should employ reliable automatic removal tools (e.g. SpyHunter) to find malicious components and delete them reliably. Follow these instructions to succeed:

1. Firstly, apply a special activation code (3425-814615-3990) which may alleviate or remove some rogue symptoms.
2. Launch a browser. If access to IE and Mozilla Firefox is still blocked, use a different browser.
3. Go to http://www.pcthreat.com/download-sph and download SpyHunter
4. Rename the installation file as spyhunter.com and install the rogue removal tool
5. Run a full system scan and delete detected malware.

Download Spyware Removal Tool to Remove* Win 7 Anti-Virus 2013
  • Quick & tested solution for Win 7 Anti-Virus 2013 removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Win 7 Anti-Virus 2013

Files associated with infection (Win 7 Anti-Virus 2013):

%CommonAppData%\
%LocalAppData%\[random].exe
%Temp%\
%AppData%\Roaming\Microsoft\Windows\Templates\

Processes to kill (Win 7 Anti-Virus 2013):

%LocalAppData%\[random].exe

Remove registry entries (Win 7 Anti-Virus 2013):

HKEY_CLASSES_ROOT\.exe\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*
HKEY_CLASSES_ROOT\ah\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*
HKEY_CLASSES_ROOT\ah\shell\open\command "IsolatedCommand"
HKEY_CURRENT_USER\Software\Classes\ "(Default)" = 'Applicati
HKEY_CURRENT_USER\Software\Classes\\DefaultIcon "(Default)" = '%1'
HKEY_CURRENT_USER\Software\Classes\\shell\open\command "(Default)" = "%LocalAppData%\.exe" -a "%1" %*
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command "(Default)" = ""%LocalAppData%\.exe -a "C:\Program Files\Mozilla Firefox\firefox.exe""
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command "(Default)" = ""%LocalAppData%\.exe" -a "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode"
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command "(Default)" = ""%LocalAppData%\.exe" -a "C:\Program Files\Internet Explorer\iexplore.exe""
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.