Security Essentials 2010

By | February 16, 2010 | 1 Comment

Security Essentials 2010 is a fake computer anti-virus program that originated from the same developers who created Internet Security 2010. This malware is created primarily not to protect a computer. Instead, it will give its victims only one option to remove threats, and that is to purchase the Security Essentials 2010 registration code.

Since it has no add/remove components during the installation process, Security Essentials 2010 removal is not an instant task through Windows. It will require you to get the full version in order to remove the whole package.

An infection may also reduce capability of the user to remove it manually by disabling some Windows components such as registry editor, task manager and control panel. Access to Internet website that is related to anti-virus and anti-malware will also be blocked. The real on only sure way left to remove Security Essentials 2010 is not to purchase it but to get a legitimate security program as discussed below.

Type Rogue
Sub-Type FakeAV
OS Affected Windows XP, Windows Vista

What are the Symptoms of Security Essentials 2010 Infection?

Security Essentials 2010  Screen Shot Image

This malware will automatically scan a computer and produce false results trying to mislead people into acquiring the Security Essentials 2010 activation and registration key.

It will modify Windows Registry and add the following entries:

  • HKEY_CURRENT_USER\Software\SE2010
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Internet Settings\ZoneMap\Domains\
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Internet Settings\ZoneMap\Domains\
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\ActiveDesktop “NoChangingWallpaper” = “1”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer “NoActiveDesktopChanges” = “1”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer “NoSetActiveDesktop” = “1”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System “DisableTaskMgr” = “1”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Run “Security essentials 2010”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Run “smss32.exe”
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\policies\ActiveDesktop “NoChangingWallpaper” = “1”
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\policies\Explorer “NoActiveDesktopChanges” = “1”
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\policies\Explorer “NoSetActiveDesktop” = “1”
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run “smss32.exe”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Internet Settings\ZoneMap\Domains\
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Internet Settings\ZoneMap\Domains\
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Internet Settings\ZoneMap\Domains\
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Internet Settings\ZoneMap\Domains\
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Internet Settings\ZoneMap\Domains\

The threat will drop the following malicious files:

  • %UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\Security essentials 2010.lnk
  • %UserProfile%\Desktop\Security essentials 2010.lnk
  • %UserProfile%\Start Menu\Security essentials 2010.lnk
  • c:\s
  • c:\Program Files\Securityessentials2010\
  • c:\Program Files\Securityessentials2010\SE2010.exe
  • c:\WINDOWS\system32\41.exe
  • c:\WINDOWS\system32\helpers32.dll
  • c:\WINDOWS\system32\smss32.exe
  • c:\WINDOWS\system32\warnings.html
  • c:\WINDOWS\system32\winlogon32.exe

Follow these Procedures to Remove Security Essentials 2010

Procedure 1: Scan Computer in Safe Mode Using Installed Anti-virus Program

1. First, we will try to remove Security Essentials 2010 by running a virus scan under Safe Mode with Networking. To perform this task, please complete these procedures.

Start in Safe Mode with Networking (Windows XP/Vista/7 Instruction)

- Please restart the computer and just before Windows start, press F8 on your keyboard repeatedly. You will be presented with Advanced Options Menu.
- From the selections, choose Safe Mode with Networking. Please use keyboard's arrow up/down to navigate between selections and press Enter to proceed.


Start Windows 8 in Safe Mode with Networking

- Please restart the computer and as soon as it begins to start, please press Shift+F8 keys.
- Instead of seeing Advance Boot Options, Windows 8 will display Recovery Mode. Continue with the given steps until you reach Safe Mode function.
- Click on 'See advanced repair options'.


- Then, click on Troubleshoot.
- Next, please select Advanced options.
- On the next window, please choose Windows Startup Settings.
- Lastly, click on Restart button. Windows 8 will now restart and boot into Advanced Boot Option wherein you can run the system in Safe Mode with Networking.


2. Open your installed anti-virus programs and update it to the most recent version by automatically downloading necessary updates.

3. Thoroughly scan the computer and remove all identified threats. Do not restart or turn off the computer after the scan process. You still need to run another scan. Please follow the next procedure.

Procedure 2: Scan and remove Security Essentials 2010 files with MalwareBytes Anti-Malware

To remove Security Essentials 2010, download Malwarebytes Anti-Malware by clicking on the button below. This tool is effective in getting rid of Trojans, viruses and malware.

Download Security Essentials 2010 Removal Tool

1. After downloading, please install the program using the default settings.
2. At the end of the installation, please make sure that it will download necessary updates.
3. Once update has completed. The tool will launch.
4. Thoroughly scan the computer and remove all threats detected by this anti-malware program.

Procedure 3: Run TrendMicro's Anti-Threat Toolkit (ATTK) to check and delete any remnants of Security Essentials 2010.

As an added help to remove Security Essentials 2010, you can scan the computer with Anti-Threat Toolkit. This software is provided and distributed by TrendMicro. Follow this procedure to run a scan with this tool.

1. Download the package by clicking on the button below. This will launch a new browser window that contains further details about the tool.

FakeAVRemover Download Link

2. Save the file to a location on your hard drive.
3. Browse for the location of the file and double-click to run. If you are using Windows Vista or Windows 7, right-click on extracted file supportcustomizedpackage and click on Run as Administrator.

Run FakeAVRemover

4. When program launch, it will run a command prompt to initialize, prepare components, and update the program.
5. Next it will open the graphical user interface (GUI) of Anti-Threat Toolkit.

FakeAVRemover GUI

6. Click on Scan Now. This operation will scan all Security Essentials 2010 files and processes in your computer and display a list of result for possible Fake Antivirus program and malware that needs to be removed.

FakeAVRemover Scan

7. Tick all items that are detected by the program, and then click Clean. The tool will start removing Security Essentials 2010 components from the computer.
8. If it asked you to restart Windows, please do so.

Protect your PC from Security Essentials 2010 or Similar Attack

Turn On Safe Browsing Features

Internet Explorer - Activate SmartScreen Filter

Internet Explorer versions 8 and 9 has this feature called SmartScreen Filter. It helps detect phishing web sites and protect you from downloading malicious files online. To turn on SmartScreen Filter, follow these steps:

1. Please open Internet Explorer.
2. On top menu, select Tools (IE 9). For IE 8, please look for Safety menu.
3. Select SmartScreen Filter from the drop-down list and click on Turn on SmartScreen Filter.

IE SmartScreen Filter

4. Please restart Internet Explorer.

SEE MORE : Comprehensive steps to activate SmartScreen Filter

Google Chrome's Enable Phishing and Malware Protection

With Google Chrome's Phishing and Malware Detection feature, you will have lesser risks browsing the web. It will display a warning when the site you are trying to visit is suspicious. To enable Phishing and Malware Protection, please do these steps:

1. Open Google Chrome.
2. Click on the Customize and control Google Chrome (3-Bars Icon) located on top right corner of the browser.
3. Select Settings from the drop-down list.
4. Once on the settings page, click on Show advanced settings... at the bottom of the page to see the rest of the Chrome setup.
5. Locate Privacy section and mark 'Enable phishing and malware protection'.

Chrome Security Settings

6. Please restart Google Chrome. New settings keep your browser safe while surfing the web.

SEE MORE : Enable Phishing and Malware Protection on Google Chrome

Mozilla Firefox - Block Attack Sites and Web Forgeries

Phishing and Malware Protection is a built-in feature on Firefox version 3 or later. It warns you when a page you are trying to visit contains phishing content or an attack site designed to drop threats on the computer. To help you keep safe while browsing the Internet using Firefox, please follow this guide:

1. Open Mozilla Firefox browser.
2. On top menu, click on Tools. Then select Options from the list.
3. Select Security and put a check mark on the following items:

  • Warn me when sites try to install add-ons
  • Block reported attack sites
  • Block reported web forgeries

Firefox Security Settings

Remove Security Essentials 2010 & Protect Your Computer Now!

Get Protection
30 Day Trial

One thought on “Security Essentials 2010

  1. DDS Central

    For such parasites, if known antimalware can’t remove them, they can usually be removed by booting the target system to another OS (eg.: a WinPE Live CD or a second Windows installation) and running some antimalware tools from there.
    You can even try mounting the infected system’s registry hives to clean the registry (I’ve never tried this though, but I think it should work).

    Well, of course the easiest way is to reformat and reinstall Windows (if you do not reformat, make sure to run a virus scan after reinstalling Windows to remove malware from your hard drive.

Leave a Reply

Your email address will not be published. Required fields are marked *