The design of Win 7 Internet Security 2011 spreading is multi-optional that ensures even distribution of the infection copies among PC users. That is, any user of unprotected PC has got approximately the same chance to get a copy of the adware installed on the PC.
In many situations users wonder how their computers have caught this virus without understanding that the program dressed up as useful system tool is a virus of self-marketing kind. That is because system flaws are intensively researched by hackers and exploited by them to secretly drop the advertising virus.
Click here to ensure complete and safe Win 7 Internet Security 2011 removal, as well as to get rid of Win 7 Internet Security 2011 droppers, where their tricks have been used to introduce the threat.
In many situations users wonder how their computers have caught this virus without understanding that the program dressed up as useful system tool is a virus of self-marketing kind. That is because system flaws are intensively researched by hackers and exploited by them to secretly drop the advertising virus.
Click here to ensure complete and safe Win 7 Internet Security 2011 removal, as well as to get rid of Win 7 Internet Security 2011 droppers, where their tricks have been used to introduce the threat.
Win 7 Internet Security 2011 screenshot:
Win 7 Internet Security 2011 removal tool:
Win 7 Internet Security 2011 manual removal guide:
Delete infected files:
%UserProfile%\Local Settings\Application Data\opRSKDelete infected registry entries:
%UserProfile%\Local Settings\Application Data\pw.exe
%UserProfile%\Local Settings\Application Data\MSASCui.exe
%UserProfile%\AppData\Local\opRSK
%UserProfile%\AppData\Local\pw.exe
%UserProfile%\AppData\Local\MSASCui.exe
HKEY_CURRENT_USER\Software\Classes\pezfile
HKEY_CLASSES_ROOT\pezfile
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1″ %*
HKEY_CURRENT_USER\Software\Classes\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1″ %*
HKEY_CLASSES_ROOT\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1″ %*
HKEY_CLASSES_ROOT\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1″ %*
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe”
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe” -safe-mode
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “C:\Program Files\Internet Explorer\iexplore.exe”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center “AntiVirusOverride” = “1″
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center “FirewallOverride” = “1″