Security Shield Pro 2011
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 100 % (High) |
Infected Computers: | 2 |
First Seen: | May 16, 2011 |
OS(es) Affected: | Windows |

Security Shield Pro 2011 Image
Security Shield Pro 2011 is a rogue security application that has infected a great number of computers around the world. This program belongs to the Security Shield family of rogue programs. Like most rogue anti-spyware programs, the goal of Security Shield Pro 2011 is to make computer users believe that their computer is severely infected. Then Security Shield Pro 2011 will offer to fix the problems if the computer user is willing to buy a Security Shield Pro 2011 license. Don't become a victim, this is all a scam. Security Shield Pro 2011 has no anti-virus or anti-malware capabilities. It is all a way for the unscrupulous people behind Security Shield Pro 2011 to get your credit card information. Instead of paying for this useless software, use a legitimate anti-malware utility to remove Security Shield Pro 2011 from your computer.
Table of Contents
The First Tasks Security Shield Pro 2011 Does When It Enters Your Computer
Security Shield Pro 2011 and Security Shield Pro 2011's clones (e.g. Security Shield) infiltrate computers without the user's knowledge. These kinds of programs use a Trojan to bypass the computer's security. Trojans are often disguised as video codecs, updates for your computer, or popular files on file sharing networks or downloading sites. Once Security Shield Pro 2011 is installed, Security Shield Pro 2011 alters the Windows Registry, so that Security Shield Pro 2011 will be loaded when the computer starts up. This program also fills your hard drive with garbage files, numerous dummy files that do nothing but take up space. Security Shield Pro 2011 does this to identify them as malware when Security Shield Pro 2011 runs its fake system scan.
Security Shield Pro 2011’s Campaign of Misinformation
Once Security Shield Pro 2011 has installed on your system and prepared itself, Security Shield Pro 2011 will begin bombarding you with alerts and fake system scans. Security Shield Pro 2011 does this to induce you into providing your credit card details. It will also conveniently find the many files Security Shield Pro 2011 put into your hard drive and label them as potential viruses. You should never try to remove any files marked as viruses. Some of these may be harmless files that your computer needs to operate normally. If your computer has symptoms of a Security Shield Pro 2011 infection, remember the guidelines below:
- Don't believe anything claimed by Security Shield Pro 2011.
- Don't give Security Shield Pro 2011 your credit card information.
- Use a real security program to get rid of Security Shield Pro 2011.
SpyHunter Detects & Remove Security Shield Pro 2011

File System Details
# | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|---|
1. | SSP.exe | e5de5f0e0cf99eefe302ff58bb57477a | 2 |
2. | %Documents and Settings%\[UserName]Local Settings\Application Data\SSP.exe | ||
3. | %AppData%\Security Shield Pro\SSP.exe | ||
4. | %UserProfile%\Application Data\Microsoft\Security Shield Pro 2011.exe | ||
5. | %Documents and Settings%\[UserName]\Local Settings\Application Data\unins000.exe | ||
6. |
C:\Documents and Settings\ |
||
7. | %Documents and Settings%\[UserName]\Local Settings\Application Data\vk_sscan.dll | ||
8. | %Documents and Settings%\[UserName]\Local Settings\Application Data\sig_light2.dat | ||
9. | %Documents and Settings%\[UserName]\Local Settings\Application Data\vk_bhotb.dat | ||
10. | %Programs%\Security Shield Pro\ | ||
11. | %Desktop%\Security Shield Pro.lnk | ||
12. | %Documents and Settings%\[UserName]\Local Settings\Application Data\pemd_mvc.dat | ||
13. | %Documents and Settings%\[UserName]Local Settings\Application Data\unins000.dat | ||
14. | %Programs%\Security Shield Pro\Uninstall Security Shield Pro.lnk | ||
15. | %AppData%\Security Shield Pro\Support.url | ||
16. | %Documents and Settings%\[UserName]\Local Settings\Application Data\sig_light.dat | ||
17. | %Documents and Settings%\[UserName]\Local Settings\Application Data\Support | ||
18. | %Programs%\Security Shield Pro\Security Shield Pro.lnk | ||
19. | %Programs%\Security Shield Pro\Security Shield Pro on the Web.lnk | ||
20. | %Desktop%\Security Shield Pro on the Web.lnk |
Registry Details
Directories
Security Shield Pro 2011 may create the following directory or directories:
%UserProfile%\Local Settings\Application Data\Security Shield Pro |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.