Once the rogue program is installed, it will prompt you to reboot your computer. After the reboot, it will scan your computer for malware once again and will state that all found infections can be removed only with a full version of the program. That's the main goal this malware - to trick you into purchased the rogue program. The scan results are false. You can safely ignore them. And, of course, don't purchase any of those rogue programs. The fake Microsoft Security Essentials Alert and related rogue programs should be removed from the computer as soon as possible. However, if you already purchased it then you should contact your credit card company and dispute the charges.
There are two other every annoying things about this malware: it blocks task manager, registry editor and other legitimate programs and it also displays fake security alerts to scare you into thinking that your computer is infected with spyware, adware, Trojans and other malware. Some of the fake security alerts read:
The fake Microsoft Security Essentials Alert and all those five rogues Red Cross Antivirus, Peak Protection 2010, Pest Detector 4.1, Major Defense Kit and AntiSpySafeguard should be remove from the system upon detection. It is obvious that this is a scam. Non of those programs will actually protect your computer against malicious software. If your computer is infected with The fake Microsoft Security Essentials Alert virus or any of those five programs please follow our removal instructions below to remove it from your computer either manually or with an automatic removal tool. Related files: tmp.exe, kjkkklklj.bat, hotfix.exe
The fake Microsoft Security Essentials Alert properties:
• Changes browser settings
• Shows commercial adverts
• Connects itself to the internet
• Stays resident in background
The fake Microsoft Security Essentials Alert manual removal
Delete registry values:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnonBadCertRecving" = "0"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnPostRedirect" = "0"
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" = "%UserProfile%\Application Data\antispy.exe"
Geolocation of The fake Microsoft Security Essentials Alert
Post a comment
Attention: Use this form only if you have additional information about a parasite, its removal instructions, additional resources or behavior. By clicking "post comment" button you agree not to post any copyrighted, unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, profane, hateful, racially, ethnically or otherwise objectionable material of any kind.