Security Essentials 2010

Security Essentials 2010 Description

ScreenshotSecurity Essentials 2010 is not a Microsoft product. Although the name is very similar to that of Microsoft Security Essentials, which is a real anti-malware program, Security Essentials 2010 is a rogue anti-malware application that tries to scare money out of the users of infected PC's. Also, Security Essentials 2010 is a rogue security application that just keeps coming back, in one way or another, sometimes under different names.

Symptoms Caused by Security Essentials 2010

The signs of an infection with Security Essentials 2010 are easy to spot, because this fake security software will constantly pester you for money. Because Security Essentials 2010 will be configured to run when Windows starts, the first time you'll see Security Essentials 2010 will be when you boot your computer, and the Security Essentials 2010 interface appears. The interface uses a weird icon, with the Windows logo inside some kind of metal frame or lock, and there will be text in at least one or two places that says that you are using the "trial version" of Security Essentials 2010. Every time this interface loads, Security Essentials 2010 will pretend to run a scan of your computer, and then Security Essentials 2010 will tell you that a very large number of the core Windows files are actually viruses. Security Essentials 2010 will offer to remove these bogus threats, but only if you pay for the full or "licensed" version of Security Essentials 2010's software by visiting the phony Security Essentials 2010 website.

Security Essentials 2010 will also try to persuade you that your PC is in danger by generating fake security warnings, which will pop-up frequently. These warnings typically begin with the phrases Critical warning, System warning, Security warning, and Attention! Either the warnings will be very vague, claiming that your PC is unprotected, or they will say that a specific threat has been found, such as the Netsky worm. However, as is the case with the phony system scans, all of the claims made in these warnings are fake. Security Essentials 2010 can't actually detect or remove malware.

In order to protect itself and to try to convince you that your computer is in danger and in need of help, Security Essentials 2010 will prevent you from running other programs, including Task Manager. When you try to run something other than Security Essentials 2010 – or the web browser, since Security Essentials 2010 needs it in order to get you to the payment site – Security Essentials 2010 will shut it down, and give you a warning message that says that the program or file in question is dangerous. It should be obvious that not every program on your computer can be dangerous or infected, but Security Essentials 2010 will shut them all down anyway.

How Security Essentials 2010 Gets into your Computer, and where Security Essentials 2010 Comes from in the First Place

Like most rogue anti-virus programs, Security Essentials 2010 relies on a Trojan in order to find a way into victim PC's. In this case, the Trojan that supports Security Essentials 2010 is commonly called Win32/Fakeinit, and it is very frequently disguised as a Flash update, offered for download on a third-party website. The Trojan may also be bundled with a freeware download. Once you have been tricked into unknowingly downloading the Trojan, it unpacks the files for Security Essentials 2010. Sometimes, it also downloads another piece of malware, called Win32/Alureon, which steals personal information stored on the affected computer. Either way, Security Essentials 2010 will become active the next time you start Windows.

Security Essentials 2010 first appeared in February 2010, but Security Essentials 2010 reappeared in November 2010, sometimes calling itself Security Essentials 2010, and sometimes using the name Security Essentials 2011. Security Essentials 2010 is also essentially identical to other rogue security applications in this family, including Internet Security Essentials 2010 and Internet Security Essentials 2011. All of these fake security programs are part of a huge Internet-based scam.[tem

Aliases: Trojan.FakeAV!gen24 [Symantec], Suspicious file [Panda], W32/FakeAV.AM!genr, Trojan.Renos [Ikarus], Trojan.Renos.Gen.1 [BitDefender], CoreGuardAntivirus2009 [Symantec], Mal/Bredo-F [Sophos], Trojan:W32/Fakexpa.BE [F-Secure], Trojan-Downloader.Win32.FraudLoad.wyhz [Kaspersky], Trojan/FakeAV.gen, Trojan.Win32.Generic!BT [Sunbelt], Trojan.FakeAV, Adware/SecurityEssentials2010 [Panda], W32/Renos.BLYS and Heuristic.LooksLike.Trojan.FraudPack.I [McAfee-GW-Edition].

Technical Information

Screenshots & Other Imagery

Tip: Turn your sound ON and watch the video in Full Screen mode to fully experience how Security Essentials 2010 infects a computer.

Security Essentials 2010 Video

Security Essentials 2010 Image 1 Security Essentials 2010 Image 2 Security Essentials 2010 Image 3 Security Essentials 2010 Image 4 Security Essentials 2010 Image 5 Security Essentials 2010 Image 6 Security Essentials 2010 Image 7

File System Details

Security Essentials 2010 creates the following file(s):
# File Name Size MD5
1 SE2010.exe 1,630,720 0f2e7c457ab4481c81544aaba8bcb212
More files

Registry Details

Security Essentials 2010 creates the following registry entry or registry entries:
File name without path
Security essentials 2010.lnk
Run keys
Security essentials 2010

More Details on Security Essentials 2010

The following URL's were found:
Tip: We recommend blocking the domain names as well as the IP addresses associated with them.
The following messages associated with Security Essentials 2010 were found:
Security Essentials 2010
Proactive system found several active vulnerabilities on your computer.
System warning!
Continue working in unprotected mode is very dangerous.
Viruses can damage your confidential data and work on your
computer. Click here to protect your computer.
System warning!
Intercepting programs that may compromise your privacy and
harm your system have been detected on your PC.
It`s highly recommended you scan your PC right now.

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.


  • monty:

    wont let me run taskmanager or regedit, or delete the folder where the exe file is, what should i do, also where can i get there compnay info, i would like to sue they


  • Gregory Englhofer:

    I have exactly the same problem... The fix mentioned above does not help, nor do any others I have found on the net, tried it in safe mode, in windows recovery console, cannot run taskmanager, regedit or delete any of the associated files?? I would like to sue them as well

  • GoldSparrow:

    Hello Gregory,

    Monty and you are experiencing similar issues. It is where Security Essentials 2010, similar to other rogues, will constantly update. What could be worst is you could have a rootkit which regenerates which means it can recreate itself after you try to remove it. We are able to track files like this on a daily basis. However, there is a feature on SpyHunter called the Spyware Helpdesk where one of our technicians can create a custom fix that is transmitted back to SpyHunter. All you would have to do is update SpyHunter.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.