Severity scale:  

XP Internet Security 2012. How to remove? (Uninstall guide)

removal by Gabriel E. Hall - -   Also known as XPInternetSecurity2012 | Type: Rogue Antispyware

XP Internet Security 2012 is a rogue security program that is promoted through the use of Trojans. Once installed, trojans will impersonate an Automatic Windows Updates window and download the bogus program onto your computer. When this fake program is running, it will simulate a system scan and display a list of false system security threats. Moreover, XP Internet Security 2012 will flood your computer with fake security warnings and impersonate Windows Security Center to make this scam look more realistic.

Privacy threat!
Spyware intrusion detected. Your system is infected. System integrity is at risk. Private data can be stolen by third parties, including credit card details and passwords. Click here to perform a security repair.

Stealth intrusion!
Infection detected in the background. Your computer is now attacked by spyware and rogue software. Eliminate the infection safely, perform a security scan and deletion now.

XP Internet Security 2012 Alert
Security Hole Detected!
A program is trying to exploit Windows security holes! Passwords and sensitive data may be stolen. Do you want to block this attack?

This virus will also hijack your web browser and block antivirus and anti-spyware programs. Finally the rogue program will ask you to pay for a full version of the program to remove the non-existing infections. Don't purchase it and remove XP Internet Security 2012 virus from your computer as soon as possible.

The bad news is that XP Internet Security 2012 (another name of virus) protects itself quite effectively. It blocks legitimate security software and hijack web browsers. In some cases it blocks all programs, not only anti-virus or anti-spyware software. What is more, it will detect many of well known and reputable websites as harmful and display fake security alert stating that you may infect your PC if you open a particular website. And of course, it disables certain Windows functions such as Task Manager, Regedit and etc. It's possible to remove it manually, but you have to re-enable those Windows functions at first. You may also download an automatic removal tool, but again have to fix some registry entries and terminate the main process of XP Internet Security 2012 which is kdn.exe to be able to run the removal tool.

To disable this scamware, also try using its registration codes. Enter one of these: 1147-175591-6550, 2233-298080-3424 or 9443-077673-5028. Additionally, download and update a reputable anti-spyware program and run a full system scan.

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software to remove XP Internet Security 2012 you agree to our privacy policy and agreement of use.
do it now!
Reimage (remover) Happiness
Reimage (remover) Happiness
Compatible with Microsoft Windows Compatible with OS X
What to do if failed?
If you failed to remove infection using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to uninstall XP Internet Security 2012. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.

Note: Manual assistance required means that one or all of removers were unable to remove parasite without some manual intervention, please read manual removal instructions below.

More information about this program can be found in Reimage review.
Press mentions on Reimage

XP Internet Security 2012 manual removal:

Kill processes:

Delete registry values:
HKEY_USERS.DEFAULTSoftwareMicrosoftInternet ExplorerBrowserEmulation "TLDUpdates" = '1'

HKEY_CURRENT_USERSoftwareClasses.exeshellopencommand "(Default)" = '"%LocalAppData%kdn.exe" -a "%1" %*'

HKEY_CURRENT_USERSoftwareClassesexefileshellopencommand "(Default)" = '"%LocalAppData%kdn.exe" -a "%1" %*'

HKEY_CLASSES_ROOT.exeshellopencommand "(Default)" = '"%LocalAppData%kdn.exe" -a "%1" %*'

HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetFIREFOX.EXEshellopencommand "(Default)" = '"%LocalAppData%kdn.exe" -a "C:Program FilesMozilla Firefoxfirefox.exe"'

HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetFIREFOX.EXEshellsafemodecommand "(Default)" = '"%LocalAppData%kdn.exe" -a "C:Program FilesMozilla Firefoxfirefox.exe" -safe-mode'

HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetIEXPLORE.EXEshellopencommand "(Default)" = '"%LocalAppData%kdn.exe" -a "C:Program FilesInternet Exploreriexplore.exe"'

HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity Center "AntiVirusOverride" = '1'

HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity Center "FirewallOverride" = '1'

Delete files:
%AllUsersProfile%Application Datau3f7pnvfncsjk2e86abfbj5h





About the author

Gabriel E. Hall
Gabriel E. Hall - Passionate web researcher

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Gabriel E. Hall
About the company Esolutions

  • Carlos

    I did not have luck. First of all, the virus prevented me to run taskkill and almost any other program in order to scan it. So, I started the system in safe mode. I tried to delete all the entries mentioned. But, in my case, i could not find any entry mentioned above. Fortunately, in safe mode i could run a program called trojan killer. It scanned ok and found 2 infected files. The problem is the machines shuts down before the scan is complete. So, i cannot remove them ! any ideas

  • Jon

    Thanks for all the posts. I quickly got rid of this malware as a direct result of your posts. It was labeled tau.exe on my system. It also disabled my ability to run other exe files i.e. install Malwarebytes.
    This link helped me fix the problem:

    The below registry value was the only one altered on my system.
    “Content Type”=”application/x-msdownload”

    After correcting it and following all of the instructions on this page I was able to download and install Malwarebytes and my system is working fine again.

  • Vipul

    On my computer the spyware was named tpe.exe
    There is also another registry value of the spyware located in:


    Hi All,

    I too had this issue to deal with last week – very frustrating having my system (Windows XP) hijacked and ransomed at $59.95. I absolutely refused to pay it! After hitting the web and seeing that it was a serious issue, I look for a solution. Although I am tech savvy, I found the solutions to be too intense for me, in fact, I almost considered taking it to my computer guy. Well, I used some common sense (no offense IT guys) and I was able to fix my problem.

    I remind you that I do have a comfort level in deleting and installing stuff so please only do this if you know what you are doing.

    NUMBER 1

    I did start with the Task Manager and closing all the .exe that started with 3 letters as the forums stated. I had 3 or 4. That did not work and I did not know which was the culprit.

    NUMBER 2

    I got tired of closing the windows when they popped up so I minimized them. At that point I realized that the flashing window displayed OAP, which was one of the processes I had disabled. BECAUSE I STILL HAD THE TASK MANAGER WINDOW OPEN I NOTICED THAT THIS OAP PROCESS KEPT POPPING BACK UP SO I KNEW THIS WAS THE CULPRIT.

    NUMBER 3

    I did a search on my C drive for the oap.exe file and located it. There was another OAP file that I also deleted (there were only 2).

    However, I could not delete the files because they were being used (SAID ACCESS DENIED, FILE IN USE or something like that). It then occurred to me that I had a timeframe of about 5-7 seconds to close the OAP process and then jump back to the file location and delete them. And that my friend did the job.

    NUMBER 4

    I did have a problem opening .EXE files so I repaired my registry with the WINXP_EXE_FIX.REG but I have no idea where I got it so you will have to do a search on how to fix this should it be deem necessary.

    My system has been working fine since. I truly hope this works for you.


  • paul

    Thanks for the writeup, it hepled me nail this one down. As a side note, the malware was named “odt.exe” on my system.

  • joe

    this set of manual instructions was the most helpful i found. to add on though, the program presented itself as tlf.exe on my computer. i deleted all the registry values listed here and when i ran malwarebytes it came up with 4 more. this was all i had to do:

    kill process: tlf.exe
    delete file: [user]local settingsapplication datatlf.exe
    delete registry values included up there and these 4:
    HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterAntivirusDisableNotify
    HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterFirewallDisableNotify
    HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterUpdatesDisableNotify
    HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrent VersionExplorerAdvancedFolderHiddenShowallCheckedValue = (Hijack.system.hidden)

    and then run a scan.

    • bryan

      Worked great for me. Infected file was gqk.exe

  • Jamie

    why wouldnt you indicate that the removal by STOPzilla is not FREE. They will do a scan of your machine but will NOT fix anything unless you pay them. There is no free trial which is BS

  • Jamie

    why wouldnt you indicate that the removal by STOPzilla is not FREE. They will do a scan of your machine but will NOT fix anything unless you pay them. There is no free trial which is BS

  • Jamie

    why wouldnt you indicate that the removal by STOPzilla is not FREE. They will do a scan of your machine but will NOT fix anything unless you pay them. There is no free trial which is BS