Click on screenshot to zoom
Danger level 9
Type: Rogue Anti-Spyware
Common infection symptoms:
  • Installs itself without permissions
  • Connects to the internet without permission
  • Slow internet connection
  • Annoying Pop-up's
  • Slow Computer

Win 7 Total Security 2012

With all the sophistication invested in rogue antispyware applications it has become increasingly difficult for even experienced users to distinguish between genuine and rogue antispyware applications such as
Win 7 Total Security 2012. This rogue in particular derives from a sophisticated family of rogues which include Vista Total Security 2012 and XP Total Security 2012. The rogue is able to change its name to adapt to its surroundings, and depending on which OS the user is running, the rogue will be able change its name to suit the operating system. But in the end it is one and the same application.

Win 7 Total Security 2012 enters the system through exploiting browser and system vulnerabilities. It will use any means at its disposal to facilitate its infiltration of the system, including using bogus online malware scanners and seditious browser hijacking websites. Once Win 7 Total Security 2012 securely roots itself in the system it will install its executable files and will generate harmless files on the on the infected PC, which it will later on report as harmful infections. This will happen when Win 7 Total Security 2012 initiates its fake system scan, and will attempt to panic the user with all its fake reports.

Of course Win 7 Total Security 2012 will offer to remove the fake threats, but only once the user pays for its worthless software. It will further try to panic the user into thinking his system is under attack by spamming him with these fake alerts:

Malware Intrusion
Sensitive areas of your system were found to be under attack. Spy software attack or virus infection possible. Prevent further damage or your private data will get stolen. Run an anti-spyware scan now. Click here to start.

System danger!
Your system security is in danger. Privacy threats detected. Spyware, keyloggers or Trojans may be working the background right now. Perform an in-depth scan and removal now, click here.

Other symptoms associated with this rogue include being unable to launch any type of executable on the system, as well as not being able to connect to the Internet. This is done in an effort by the rogue to prevent the user from running or downloading any application which may be able to get rid of Win 7 Total Security 2012. It will also consume system resources to slow the PC down considerably, and promote erratic system behavior.

At the end of the day you will only be able to regain control of your system if you destroy Win 7 Total Security 2012 immediately. Employ the removal power of a genuine security tool which will not only be able to erase Win 7 Total Security 2012 but also protect your PC against similar attacks in future.

The rogue removal will be easier if you used these activation codes to “register” the rogue:


This rogue is particularly annoying because right after the installation it blocks every single exe file and you can no longer run your computer. Then there is nothing else left to but to restart your computer. When you do, while it boots press F8 and select to load the Safe Mode with Networking, so that you could download SpyHunter from our website. Then restart again, and load your computer in Normal mode to install SpyHunter. Another way to install the program is to download it on another computer, rename the installer file from installer.exe to and then transfer the file into a USB flash drive. Plug the drive into the infected computer and use it to install the program.

Once SpyHunter is installed, it will scan your computer and detect the rogue, and kill it.

NOTE: Just because you can no longer see the rogue it does not mean that it doesn’t exist. Perform a full system scan to locate and terminate all of its components, because any file associated with the rogue can leave your computer’s door open for other malware.

Download Spyware Removal Tool to Remove* Win 7 Total Security 2012
  • Quick & tested solution for Win 7 Total Security 2012 removal.
  • 100% Free Scan for Windows

How to manually remove Win 7 Total Security 2012

Files associated with Win 7 Total Security 2012 infection:


Win 7 Total Security 2012 processes to kill:


Remove Win 7 Total Security 2012 registry entries:

HKEY_CLASSES_ROOT\.exe\shell\open\command “(Default)” = ‘”%Documents and Settings%\[UserName]\Local Settings\Application Data\[random].exe” -a “%1″ %*’
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command “(Default)” = ‘”%Documents and Settings%\[UserName]\Local Settings\Application Data\[random].exe” -a “%1″ %*’
HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command “(Default)” = ‘”%Documents and Settings%\[UserName]\Local Settings\Application Data\[random].exe” -a “%1″ %*’
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command “(Default)” = ‘”%Documents and Settings%\[UserName]\Local Settings\Application Data\[random].exe” -a “%Program Files%\Mozilla Firefox\firefox.exe”‘
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command “(Default)” = ‘”%Documents and Settings%\[UserName]\Local Settings\Application Data\[random].exe” -a “%Program Files%\Mozilla Firefox\firefox.exe” -safe-mode’
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command “(Default)” = ‘”%Documents and Settings%\[UserName]\Local Settings\Application Data\[random].exee” -a “%Program Files%\Internet Explorer\iexplore.exe”‘
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center “AntiVirusOverride” = ’1′
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center “FirewallOverride” = ’1′
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\BrowserEmulation “TLDUpdates” = ’1′

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.