Antivirus Studio 2010

Antivirus Studio 2010 Description

Type: Rogue Anti-Virus Program

ScreenshotAntivirus Studio 2010 aka AntivirusStudio2010 is a rogue security application that belongs to the UnVirex family and secretly spreads via Trojans. On infiltrating a system, AntivirusStudio2010 will simulate a fake system scan and display fake security alerts to convince a victim that his/her system is severely infected with dangerous malware. The victim will be coerced into purchasing the supposed "full version" of AntivirusStudio2010 to remove the detected malware. All security alerts and scan reports generated by Antivirus Studio 2010 are not to be trusted; instead users should have Antivirus Studio 2010 removed from their systems upon detection.

Among Antivirus Studio 2010 numerous clones are UnVirex, Desktop Security 2010, Securityinspector2010, Antivirus System 2011, Antivirus Antispyware 2011, Security Solution 2011, Antivirus Protection 2012.

Aliases: Trojan-Dropper.Delf.gjg, Sus/UnkPacker [Sophos], Generic PUP.l [McAfee], Crypt.ADNR [AVG], TROJ_FAKEAV.SME6, Trojan-Downloader.Win32.Vundo [Ikarus], Trojan-Downloader.Win32.Vundo!IK, Trojan-Downloader.Win32.Mufanom [Ikarus], Trojan-Downloader.Win32.Mufanom!IK, a variant of Win32/Cimag.DZ [NOD32], RogueAntiSpyware.SecurityEssentialFraud!rem, Trojan.FakeAV.1267 [DrWeb], TROJ_FAKEAV.SMTZ, SecurityEssentialFraud [Symantec] and a variant of Win32/Adware.FakeAntiSpy.P [NOD32].

Technical Information

Screenshots & Other Imagery

Antivirus Studio 2010 Image Antivirus Studio 2010 Image Antivirus Studio 2010 Image Antivirus Studio 2010 Image Antivirus Studio 2010 Image

File System Details

Antivirus Studio 2010 creates the following file(s):
# File Name Size MD5 Detection Count
1 %TEMP%\avp32.exe 49,668 989038a30d0dbd736dc0525b5322fae1 3
2 %USERPROFILE%\Lokale Einstellungen\Anwendungsdaten\41515812.exe 1,224,192 53a21e932049ebc5367df2e13e682651 2
3 %TEMP%\avp32 .exe 43,616 f45158deb15e257fa757aab46143fa6c 1
4 %TEMP%\avp32 .exe 43,628 9ae069581b6efcd2b194ea99f54a272e 1
5 %TEMP%\avp32 .exe 43,660 0878cb5752553203ac15337b829231e9 1
6 %TEMP%\avp32 .exe 43,568 124295ed1f28a6620ed0144aa96cdaad 1
7 %TEMP%\avp32 .exe 43,632 1da4d31943e859da43ccbd5376f292ff 1
8 %TEMP%\avp32 .exe 43,620 7d2dd180d32c76b85016a9cb311246f5 1
9 %TEMP%\avp32 .exe 43,628 1d99b657ef901b46f9bed021004c04dc 1
10 %TEMP%\avp32 .exe 43,604 3b41eff136ec7d111b73a7026e867124 1
11 %TEMP%\avp32 .exe 43,616 0ada4c640c5d71c02bba93422c0c03ba 1
12 %TEMP%\avp32 .exe 43,688 37ae5fb1f46c1b42f039146cf8bd3b5d 1
13 %TEMP%\avp32 .exe 43,636 94495ad4f83d846f4941a727ab68a341 1
14 %TEMP%\avp32 .exe 43,684 87d0461aa9577fa2191f02d467c7a91a 1
15 %TEMP%\avp32 .exe 43,564 9bfccc717c394bb2ab03160dc9c96e28 1
16 %TEMP%\avp32 .exe 43,620 8d0e9039f0353090272f6cfb5bf0bba2 1
17 %TEMP%\avp32 .exe 43,544 7b1edd18c342a89b32bc2f6a52ea366d 1
18 %TEMP%\avp32 .exe 43,600 d7840f76d184686a1767df1417793a8f 1
19 %TEMP%\avp32 .exe 43,632 f8a695eb7d3e873d38a46050ad6a446e 1
20 %TEMP%\avp32 .exe 43,628 2db6194f05cc3b62fecf1684b39d6938 1
21 %TEMP%\avp32 .exe 43,668 7b367bf8f65f044ac2b6473e33c5ace1 1
22 %TEMP%\avp32 .exe 43,700 49fd7dc11577e56b8ff5e591689039c1 1
23 %TEMP%\avp32 .exe 43,612 75b0f61b0c8682c179e725b83a4df404 1
24 %TEMP%\avp32 .exe 43,672 4e04245ac18b064abc6af71bc0e9f287 1
25 %TEMP%\avp32 .exe 43,656 5567698cf071d7dcb12a8c1e6bd0ae07 1
26 %TEMP%\avp32 .exe 43,688 32305ccf65dc089a0dfd91701ae8a318 1
27 %TEMP%\avp32 .exe 43,608 b72101a349c9e1656ef07695de17771f 1
More files

Registry Details

Antivirus Studio 2010 creates the following registry entry or registry entries:
%APPDATA%\AntiVirus 2010
%APPDATA%\AntiVirus 2010
%APPDATA%\AntiVirus Studio 2010

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.


Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.

HTML is not allowed.