Threat Database Rogue Anti-Spyware Program Windows Security System 2010

Windows Security System 2010

Windows Security System 2010 is a rogue anti-spyware application that propagates with the help of Trojans. Once the trial version of Windows Security System 2010 is inside your system it will generate fake pop-up alerts and run scanners that will detect non-existent malware on the compromised PC. Do not believe the security notifications displayed by Windows Security System 2010; they are just part of a scam to scare users into paying for its "full" version which will purportedly remove all the "detected" malware. Windows Security System 2010 is a useless program that should be removed immediately after detection.

File System Details

Windows Security System 2010 may create the following file(s):
# File Name Detections
1. %AppData%\ave.exe

Registry Details

Windows Security System 2010 may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Classes\.exe\shell
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas
HKEY_CURRENT_USER\Software\Classes\.exe\shell\start\command
HKEY_CURRENT_USER\Software\Classes\secfile\shell
HKEY_CURRENT_USER\Software\Classes\secfile\shell\runas
HKEY_CURRENT_USER\Software\Classes\secfile\shell\start\command
HKEY_CURRENT_USER\Software\Classes\.exe | @ = "secfile"
HKEY_CURRENT_USER\Software\Classes\secfile\shell\open\command | IsolatedCommand = "%1" %*
HKEY_CURRENT_USER\Software\Classes\.exe\DefaultIcon
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command
HKEY_CURRENT_USER\Software\Classes\.exe\shell\start
HKEY_CURRENT_USER\Software\Classes\secfile\DefaultIcon
HKEY_CURRENT_USER\Software\Classes\secfile\shell\open\command
HKEY_CURRENT_USER\Software\Classes\secfile\shell\start
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command | IsolatedCommand = "%1" %*
HKEY_CURRENT_USER\Software\Classes\secfile\shell\open\command | @ = "%AppData%\ave.exe" /START "%1" %*
HKEY_CURRENT_USER\Software\Classes\.exe
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command
HKEY_CURRENT_USER\Software\Classes\secfile
HKEY_CURRENT_USER\Software\Classes\secfile\shell\open
HKEY_CURRENT_USER\Software\Classes\secfile\shell\runas\command
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command | @ = "%AppData%\ave.exe" /START "%1" %*
HKEY_CURRENT_USER\Software\Classes\.exe | Content Type = "application/x-msdownload"

Trending

Most Viewed

Loading...