Security Essentials 2010
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
|Threat Level:||100 % (High)|
|First Seen:||February 18, 2010|
|Last Seen:||March 9, 2023|
Security Essentials 2010 is not a Microsoft product. Although the name is very similar to that of Microsoft Security Essentials, which is a real anti-malware program, Security Essentials 2010 is a rogue anti-malware application that tries to scare money out of the users of infected PC's. Also, Security Essentials 2010 is a rogue security application that just keeps coming back, in one way or another, sometimes under different names.
Table of Contents
Symptoms Caused by Security Essentials 2010
The signs of an infection with Security Essentials 2010 are easy to spot, because this fake security software will constantly pester you for money. Because Security Essentials 2010 will be configured to run when Windows starts, the first time you'll see Security Essentials 2010 will be when you boot your computer, and the Security Essentials 2010 interface appears. The interface uses a weird icon, with the Windows logo inside some kind of metal frame or lock, and there will be text in at least one or two places that says that you are using the "trial version" of Security Essentials 2010. Every time this interface loads, Security Essentials 2010 will pretend to run a scan of your computer, and then Security Essentials 2010 will tell you that a very large number of the core Windows files are actually viruses. Security Essentials 2010 will offer to remove these bogus threats, but only if you pay for the full or "licensed" version of Security Essentials 2010's software by visiting the phony Security Essentials 2010 website.
Security Essentials 2010 will also try to persuade you that your PC is in danger by generating fake security warnings, which will pop-up frequently. These warnings typically begin with the phrases Critical warning, System warning, Security warning, and Attention! Either the warnings will be very vague, claiming that your PC is unprotected, or they will say that a specific threat has been found, such as the Netsky worm. However, as is the case with the phony system scans, all of the claims made in these warnings are fake. Security Essentials 2010 can't actually detect or remove malware.
In order to protect itself and to try to convince you that your computer is in danger and in need of help, Security Essentials 2010 will prevent you from running other programs, including Task Manager. When you try to run something other than Security Essentials 2010 – or the web browser, since Security Essentials 2010 needs it in order to get you to the payment site – Security Essentials 2010 will shut it down, and give you a warning message that says that the program or file in question is dangerous. It should be obvious that not every program on your computer can be dangerous or infected, but Security Essentials 2010 will shut them all down anyway.
How Security Essentials 2010 Gets into your Computer, and where Security Essentials 2010 Comes from in the First Place
Like most rogue anti-virus programs, Security Essentials 2010 relies on a Trojan in order to find a way into victim PC's. In this case, the Trojan that supports Security Essentials 2010 is commonly called Win32/Fakeinit, and it is very frequently disguised as a Flash update, offered for download on a third-party website. The Trojan may also be bundled with a freeware download. Once you have been tricked into unknowingly downloading the Trojan, it unpacks the files for Security Essentials 2010. Sometimes, it also downloads another piece of malware, called Win32/Alureon, which steals personal information stored on the affected computer. Either way, Security Essentials 2010 will become active the next time you start Windows.
Security Essentials 2010 first appeared in February 2010, but Security Essentials 2010 reappeared in November 2010, sometimes calling itself Security Essentials 2010, and sometimes using the name Security Essentials 2011. Security Essentials 2010 is also essentially identical to other rogue security applications in this family, including Internet Security Essentials 2010 and Internet Security Essentials 2011. All of these fake security programs are part of a huge Internet-based scam.
15 security vendors flagged this file as malicious.
SpyHunter Detects & Remove Security Essentials 2010
Security Essentials 2010 Video
Tip: Turn your sound ON and watch the video in Full Screen mode.
File System Details
Detections: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
Security Essentials 2010 may create the following directory or directories:
Security Essentials 2010 may call the following URLs: