Desktop Security 2010
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 100 % (High) |
Infected Computers: | 5,129 |
First Seen: | January 26, 2010 |
Last Seen: | January 23, 2022 |
OS(es) Affected: | Windows |
Desktop Security 2010 is not a real security program. In fact, Desktop Security 2010 is a highly-developed, well-promoted fraud, and Desktop Security 2010 laid the ground work for a large family of rogue anti-virus programs that have followed Desktop Security 2010, the UnVirex family. It is important to remember that whatever Desktop Security 2010 may say about a computer's security, you can't rely on Desktop Security 2010 to be accurate or true. Also, even though Desktop Security 2010 is by now a rather dated threat, Desktop Security 2010 should not be overlooked or ignored, because many other fake security applications are based on Desktop Security 2010. Desktop Security 2010 causes severe symptoms, and Desktop Security 2010 can disable any PC Desktop Security 2010 infects. Among the many changes that Desktop Security 2010 will make to the Registry is a change that sets Desktop Security 2010 up to run every time you start Windows. So, as Windows loads, you will see the phony home screen for Desktop Security 2010, which uses the Windows logo and is styled to look like the interface of a real security application. Every time the interface loads, Desktop Security 2010 will play a scan progress animation in order to simulate a scan of your PC.
To top it off, when the fake scan finishes, Desktop Security 2010 will play an audio clip of a woman saying, "New virus found! Please activate your anti-virus software!" These bogus scans always turn up lists of threats that Desktop Security 2010 claims to have found, but most or all of the reported threats are harmless, empty files that Desktop Security 2010 created so that Desktop Security 2010 could "find" them later. Nonetheless, Desktop Security 2010 will urge you to remove these so-called threats, and when you try to remove them, Desktop Security 2010 will tell you that you can't do that unless you purchase a license for the full version of its software. If you refuse Desktop Security 2010's offers for the purchase of a license, the malware will lock down your PC and hold it hostage.
After the fake scan is over, and the phony home screen has cleared, Desktop Security 2010 will continue to try to scare you into purchasing a fake security program license by generating a large number of fake security alerts. Most of the alerts say things that are very vague, for example "spyware has been detected on your computer", and everything the alerts warn you about spyware is made up. One of the most common alerts caused by Desktop Security 2010, which appears in malware that is based on Desktop Security 2010, is an alert that says that Security Center detected a threat called Win64.BIT.Looker.exe, to which Desktop Security 2010 basically ascribes every kind of malware or virus characteristic, as well as claiming that Win64.BIT.Looker.exe can exert physical wear on your PC.
Desktop Security 2010 also creates warnings about a nonexistent infection called Sft.dez.Wien frequently, as well as warnings that make the ridiculous claim that Desktop Security 2010 has found malware on your computer that could physically damage the BIOS (the Basic Input Output System, which is housed in its own chip on the motherboard). In addition to its scare tactics, Desktop Security 2010 does a few things to try to make sure that you can't remove the malware from your computer. Desktop Security 2010 will disable any real anti-virus software that you have, along with most of your other programs. Earlier versions of Desktop Security 2010 disabled Task Manager, but later on, Desktop Security 2010 began altering Task Manager so that it would display a column of information next to each running application or process, labeling each one as infected or clean. Although your web browser may remain available, Desktop Security 2010 will hijack it, so when you try to visit Internet, you will only be able to view the websites that claim to sell Desktop Security 2010. Often, you will be presented with a variety of "special offers" that will try to lure you into handing over the money that the malware demands, by lowering its price.
Desktop Security 2010 has a history of using a wide variety of distribution methods in order to infect as many computers as possible. At first, it was common for Desktop Security 2010 to be installed by a Trojan, that was disguised as a video codec downloaded from a malicious or sketchy website. Then, the crooks behind Desktop Security 2010 got a bit more sophisticated. Desktop Security 2010 began to be distributed through attachments to spam emails, which claimed to be from McAfee, offering some amount of free anti-virus service. Then Desktop Security 2010 began to be distributed through Google groups, using a combination of malicious or fake Google groups pages and phishing emails send to Google groups users in order to draw people into Desktop Security 2010's scam. Also, as is the case with most fake security programs, Desktop Security 2010 is (or was) supported by browser hijackers and malicious websites, such as httpswork, desktopsecurity2010ltd.com, and desktopsecurityorg.com, which offered paid downloads of Desktop Security 2010 in a still malicious, but less aggressive form.
Since the appearance of Desktop Security 2010 in January 2010, many more rogue anti-virus programs that are based on Desktop Security 2010 have been released and are essentially a continuation of its malware family. Some of these other fake security programs are UnVirex, Antivirus Studio 2010, Securityinspector2010, Antivirus System 2011, Antivirus Antispyware 2011, Security Solution 2011, Antivirus Protection 2012.
Table of Contents
Aliases
15 security vendors flagged this file as malicious.
Anti-Virus Software | Detection |
---|---|
AVG | SHeur3.ARJW |
McAfee-GW-Edition | Heuristic.BehavesLike.Win32.Suspicious.P |
McAfee-GW-Edition | Heuristic.BehavesLike.Win32.Suspicious.A |
DrWeb | Trojan.Siggen2.350 |
AntiVir | TR/Crypt.XPACK.Gen |
NOD32 | a variant of Win32/Kryptik.FSY |
BitDefender | Gen:Trojan.Heur.FU.IDW@aaZ@ovo |
NOD32 | a variant of Win32/Kryptik.FOA |
McAfee | Generic FakeAlert!jw |
Ikarus | Trojan.ATRAPS |
DrWeb | Trojan.Siggen2.48 |
AVG | Generic18.AVNM |
AhnLab-V3 | Win-Trojan/Fakeav.268800.C |
Symantec | WS.Reputation.1 |
Sophos | Troj/FakeAv-BLP |
SpyHunter Detects & Remove Desktop Security 2010
File System Details
# | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|---|
1. | Desktop Security 2010.exe | 1c2ad4d88b70565623c823d3e9d048c2 | 83 |
2. | securitycenter.exe | ade6e5be1bb8fe4931295b39ed1722ed | 70 |
3. | securitycenter.exe | ea7d564e7fa9b5c5a2c7737760b93326 | 14 |
4. | Desktop Security 2010.exe | 52e2d729fa5de153a0adc466940badef | 12 |
5. | securitycenter.exe | 12d795bf44a8a47743f249420aa522a9 | 11 |
6. | Desktop Security 2010.exe | 2499de7a488da8ece42eae0c137a0648 | 9 |
7. | securitycenter.exe | c212a22365b626d07ed90013fe217296 | 7 |
8. | securitycenter.exe | 595f658af6289c3ee0f3197b6e1d5f1b | 7 |
9. | Desktop Security 2010.exe | 58a52bebca19bb395a041615aae79382 | 7 |
10. | Desktop Security 2010.exe | d91f8116a06c7a5d6186efa6298850cc | 5 |
11. | securitycenter.exe | dbdb2c46dc15fe6b15a87f8d5217086a | 5 |
12. | securitycenter.exe | 511f0dddbe83132f40a533b9d3b92790 | 3 |
13. | Desktop Security 2010.exe | 0e06118b7829ee42bb9f96b9d8ab5e52 | 3 |
14. | Desktop Security 2010.exe | f86f6e3a2e225d2f07687570759ba470 | 3 |
15. | securitycenter.exe | 4774265cf1497f09e76af68c9a79db72 | 2 |
16. | Desktop Security 2010.exe | cdc673d6576b3a978015a81ac642db4b | 2 |
17. | securitycenter.exe | e0201248474947a89a993c1c6e51f3f2 | 2 |
18. | Desktop Security 2010.exe | 427e737f12b7ca06d58a87bbfa9927d1 | 2 |
19. | Desktop Security 2010.exe | 54598a2f060d3737bf5ea43f6d1fcd63 | 2 |
20. | securitycenter.exe | 6aeed4d95551c54df30e57146ee13a78 | 2 |
21. | securitycenter.exe | f16ef0b00ebfacb5faa8de1492484e84 | 1 |
22. | securitycenter.exe | 8f99a91003b3d309696f30b358f8c4f6 | 1 |
23. | Desktop Security 2010.exe | f3050c07d31f02c4e2d6e91b9bbd7660 | 1 |
24. | securitycenter.exe | 070fe752e9f0b5e7af04b40b884e93c6 | 1 |
25. | Desktop Security 2010.exe | 02816cf4fed4fe6c09930082b7177cea | 1 |
26. | Desktop Security 2010.exe | 7049d16a58f34a3fa33760451ead5078 | 1 |
27. | securitycenter.exe | b111318bda62ff9aa806ee9a5bade0be | 1 |
28. | Desktop Security 2010.exe | bf475715034e27b67942c2274c89fe3c | 1 |
29. | Desktop Security 2010.exe | 8203558be5b3663e69204744129161c8 | 1 |
Registry Details
Directories
Desktop Security 2010 may create the following directory or directories:
%ProgramFiles%\Desktop Security 2010 |