Desktop Security 2010

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 5,129
First Seen: January 26, 2010
Last Seen: January 23, 2022
OS(es) Affected: Windows

Desktop Security 2010 Image

Desktop Security 2010 is not a real security program. In fact, Desktop Security 2010 is a highly-developed, well-promoted fraud, and Desktop Security 2010 laid the ground work for a large family of rogue anti-virus programs that have followed Desktop Security 2010, the UnVirex family. It is important to remember that whatever Desktop Security 2010 may say about a computer's security, you can't rely on Desktop Security 2010 to be accurate or true. Also, even though Desktop Security 2010 is by now a rather dated threat, Desktop Security 2010 should not be overlooked or ignored, because many other fake security applications are based on Desktop Security 2010. Desktop Security 2010 causes severe symptoms, and Desktop Security 2010 can disable any PC Desktop Security 2010 infects. Among the many changes that Desktop Security 2010 will make to the Registry is a change that sets Desktop Security 2010 up to run every time you start Windows. So, as Windows loads, you will see the phony home screen for Desktop Security 2010, which uses the Windows logo and is styled to look like the interface of a real security application. Every time the interface loads, Desktop Security 2010 will play a scan progress animation in order to simulate a scan of your PC.

To top it off, when the fake scan finishes, Desktop Security 2010 will play an audio clip of a woman saying, "New virus found! Please activate your anti-virus software!" These bogus scans always turn up lists of threats that Desktop Security 2010 claims to have found, but most or all of the reported threats are harmless, empty files that Desktop Security 2010 created so that Desktop Security 2010 could "find" them later. Nonetheless, Desktop Security 2010 will urge you to remove these so-called threats, and when you try to remove them, Desktop Security 2010 will tell you that you can't do that unless you purchase a license for the full version of its software. If you refuse Desktop Security 2010's offers for the purchase of a license, the malware will lock down your PC and hold it hostage.

After the fake scan is over, and the phony home screen has cleared, Desktop Security 2010 will continue to try to scare you into purchasing a fake security program license by generating a large number of fake security alerts. Most of the alerts say things that are very vague, for example "spyware has been detected on your computer", and everything the alerts warn you about spyware is made up. One of the most common alerts caused by Desktop Security 2010, which appears in malware that is based on Desktop Security 2010, is an alert that says that Security Center detected a threat called Win64.BIT.Looker.exe, to which Desktop Security 2010 basically ascribes every kind of malware or virus characteristic, as well as claiming that Win64.BIT.Looker.exe can exert physical wear on your PC.

Desktop Security 2010 also creates warnings about a nonexistent infection called Sft.dez.Wien frequently, as well as warnings that make the ridiculous claim that Desktop Security 2010 has found malware on your computer that could physically damage the BIOS (the Basic Input Output System, which is housed in its own chip on the motherboard). In addition to its scare tactics, Desktop Security 2010 does a few things to try to make sure that you can't remove the malware from your computer. Desktop Security 2010 will disable any real anti-virus software that you have, along with most of your other programs. Earlier versions of Desktop Security 2010 disabled Task Manager, but later on, Desktop Security 2010 began altering Task Manager so that it would display a column of information next to each running application or process, labeling each one as infected or clean. Although your web browser may remain available, Desktop Security 2010 will hijack it, so when you try to visit Internet, you will only be able to view the websites that claim to sell Desktop Security 2010. Often, you will be presented with a variety of "special offers" that will try to lure you into handing over the money that the malware demands, by lowering its price.

Desktop Security 2010 has a history of using a wide variety of distribution methods in order to infect as many computers as possible. At first, it was common for Desktop Security 2010 to be installed by a Trojan, that was disguised as a video codec downloaded from a malicious or sketchy website. Then, the crooks behind Desktop Security 2010 got a bit more sophisticated. Desktop Security 2010 began to be distributed through attachments to spam emails, which claimed to be from McAfee, offering some amount of free anti-virus service. Then Desktop Security 2010 began to be distributed through Google groups, using a combination of malicious or fake Google groups pages and phishing emails send to Google groups users in order to draw people into Desktop Security 2010's scam. Also, as is the case with most fake security programs, Desktop Security 2010 is (or was) supported by browser hijackers and malicious websites, such as httpswork, desktopsecurity2010ltd.com, and desktopsecurityorg.com, which offered paid downloads of Desktop Security 2010 in a still malicious, but less aggressive form.

Since the appearance of Desktop Security 2010 in January 2010, many more rogue anti-virus programs that are based on Desktop Security 2010 have been released and are essentially a continuation of its malware family. Some of these other fake security programs are UnVirex, Antivirus Studio 2010, Securityinspector2010, Antivirus System 2011, Antivirus Antispyware 2011, Security Solution 2011, Antivirus Protection 2012.
ScreenshotScreenshotScreenshotScreenshot

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
AVG SHeur3.ARJW
McAfee-GW-Edition Heuristic.BehavesLike.Win32.Suspicious.P
McAfee-GW-Edition Heuristic.BehavesLike.Win32.Suspicious.A
DrWeb Trojan.Siggen2.350
AntiVir TR/Crypt.XPACK.Gen
NOD32 a variant of Win32/Kryptik.FSY
BitDefender Gen:Trojan.Heur.FU.IDW@aaZ@ovo
NOD32 a variant of Win32/Kryptik.FOA
McAfee Generic FakeAlert!jw
Ikarus Trojan.ATRAPS
DrWeb Trojan.Siggen2.48
AVG Generic18.AVNM
AhnLab-V3 Win-Trojan/Fakeav.268800.C
Symantec WS.Reputation.1
Sophos Troj/FakeAv-BLP

SpyHunter Detects & Remove Desktop Security 2010

File System Details

Desktop Security 2010 may create the following file(s):
# File Name MD5 Detections
1. Desktop Security 2010.exe 1c2ad4d88b70565623c823d3e9d048c2 83
2. securitycenter.exe ade6e5be1bb8fe4931295b39ed1722ed 70
3. securitycenter.exe ea7d564e7fa9b5c5a2c7737760b93326 14
4. Desktop Security 2010.exe 52e2d729fa5de153a0adc466940badef 12
5. securitycenter.exe 12d795bf44a8a47743f249420aa522a9 11
6. Desktop Security 2010.exe 2499de7a488da8ece42eae0c137a0648 9
7. securitycenter.exe c212a22365b626d07ed90013fe217296 7
8. securitycenter.exe 595f658af6289c3ee0f3197b6e1d5f1b 7
9. Desktop Security 2010.exe 58a52bebca19bb395a041615aae79382 7
10. Desktop Security 2010.exe d91f8116a06c7a5d6186efa6298850cc 5
11. securitycenter.exe dbdb2c46dc15fe6b15a87f8d5217086a 5
12. securitycenter.exe 511f0dddbe83132f40a533b9d3b92790 3
13. Desktop Security 2010.exe 0e06118b7829ee42bb9f96b9d8ab5e52 3
14. Desktop Security 2010.exe f86f6e3a2e225d2f07687570759ba470 3
15. securitycenter.exe 4774265cf1497f09e76af68c9a79db72 2
16. Desktop Security 2010.exe cdc673d6576b3a978015a81ac642db4b 2
17. securitycenter.exe e0201248474947a89a993c1c6e51f3f2 2
18. Desktop Security 2010.exe 427e737f12b7ca06d58a87bbfa9927d1 2
19. Desktop Security 2010.exe 54598a2f060d3737bf5ea43f6d1fcd63 2
20. securitycenter.exe 6aeed4d95551c54df30e57146ee13a78 2
21. securitycenter.exe f16ef0b00ebfacb5faa8de1492484e84 1
22. securitycenter.exe 8f99a91003b3d309696f30b358f8c4f6 1
23. Desktop Security 2010.exe f3050c07d31f02c4e2d6e91b9bbd7660 1
24. securitycenter.exe 070fe752e9f0b5e7af04b40b884e93c6 1
25. Desktop Security 2010.exe 02816cf4fed4fe6c09930082b7177cea 1
26. Desktop Security 2010.exe 7049d16a58f34a3fa33760451ead5078 1
27. securitycenter.exe b111318bda62ff9aa806ee9a5bade0be 1
28. Desktop Security 2010.exe bf475715034e27b67942c2274c89fe3c 1
29. Desktop Security 2010.exe 8203558be5b3663e69204744129161c8 1
More files

Registry Details

Desktop Security 2010 may create the following registry entry or registry entries:
File name without path
Activate Desktop Security 2010.lnk
Desktop Security 2010.lnk
Help Desktop Security 2010.lnk
How to Activate Desktop Security 2010.lnk

Directories

Desktop Security 2010 may create the following directory or directories:

%ProgramFiles%\Desktop Security 2010

Messages

The following messages associated with Desktop Security 2010 were found:

Security Center Alert
To help protect your computer, Desktop Security 2010 has blocked some features of this program.
Name Sft.dez.Wien
Risk High
Description Sft.dez.Wien is a virus attempts to spread itself by attaching to a host program, and can damage hardware, software or data in the process. This worm can be blocked from firewall and antivirus software.
Spyware Warning
Your online guard helps to stop unauthorized changes to your computer
Details: Spyware detected on your computer
Warning! You computer in danger
Use a safe computer with Desktop Security 2010 you online guard.
Do you want to leave unwanted software or viruses on you PC?
Your computer might be at risk
Antivirus detects viruses, worms, and Trojan horses. They can (and do) destroy data, format your hard disk or can destroy the BIOS. By destroying the BIOS many times you end up buying a new motherboard or if the bios chip is removable then that chip would need replacing.
Click this balloon to fix this problem.

No firewall is turned on
Automatic Updates is turned off
Antivirus software might not be activated
Click this balloon to fix this problem.

2 Comments

i can not get on my internet page please help me

I have been infected by VirusRemover2008 which came along for the ride when I dodlonawed Cursor Mania. I had wanted to make my cursor easier to see and thought this was a good answer. Since being infected, I found my desktop radically altered, removing many programs from the desktop, my authorization for reading the directories, the authorization to open TaskManager, my loss of the option to open my Windows as system manager, the inability of command prompt DOS commands to go anywhere except my C-Drive are among many functions I have lost. I installed HiJack This by downloading from another computer and burning to a CD and that analyzed that several random lettered DLLs had be added. I was able to disable those DLLs using SpyWareGuard, but within seconds they were reinstalled. I disabled Internet Explorer by renaming the executable and that has slowed down the assault of references to VirusRemover2008 as the solution to my problem (for a slight fee!). I am using Firefox to reach this site and responded, but periodically about 8-10 blak windows of Firefox will open, clogging up internet access. This is really a bad actor. I dodlonawed Microsoft Windows Malicious Software Removal Tool (KB890830) and have not yet been able to install it. This IS TRULY A BADDD ACTOR!

Trending

Most Viewed

Loading...