Why did Microsoft Security Essentials Knowingly Allow Virus?
I started my computer and was notified of updates. The updates were Microsoft Sliverlight 6.0MB and Microsoft Security Essentials. I updated. I shut down my computer and went to work. I came back and started my computer and received a popup that Java failed
to start, click here to fix. It was only through quick thinking and experience that I avoided a disaster. I shut down my computer and restarted in safe mode with networking. I opened MSE and the virus was listed in the history and the action taken was
allowed. Allowed, my settings are Quarantine for all 4 levels. How can MSE allow a virus when it knows it is a virus?
I did a full scan and MSE said No threats were found.
No threats, it is a Virus! Since the virus was listed in History in all detected items there is no option to remove it. It was not listed in Quarantined or Allowed. I went to OneCare Safety Scanner,
No help there also! I did a system restore (which might not have worked had I let the virus scan my computer). I have always said system restore is last option. I have fixed every problem to date and never used system restore before. I
volunteer on Microsoft TechNet and Microsoft Answers forums and this is my very first question. My system log below shows the virus.
My blood is boiling over!!!!!!!!
Log Name: System
Source: Microsoft Antimalware
Date: 14/02/2011 6:12:37 PM
Event ID: 1116
Task Category: None
Level: Warning
Keywords: Classic
User: N/A
Computer: Removed for security
Description:
Microsoft Antimalware has detected malware or other potentially unwanted software.
For more information please see the following:
http://go.microsoft.com/fwlink/?linkid=37020&name=Rogue:Win32/FakeRean&threatid=2147607809
Name: Rogue:Win32/FakeRean
ID: 2147607809
Severity: Severe
Category: Trojan
Path: process:_pid:3920
Detection Origin: Unknown
Detection Type: Heuristics
Detection Source: System
User: NT AUTHORITY\SYSTEM
Process Name: C:\Users\Removed for security\AppData\Roaming\defender.exe
Signature Version: AV: 1.97.1671.0, AS: 1.97.1671.0, NIS: 9.1.0.0
Engine Version: AM: 1.1.6502.0, NIS: 2.0.5854.0
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft Antimalware" />
<EventID Qualifiers="0">1116</EventID>
<Level>3</Level>
<Task>0</Task>
<Keywords>0x80000000000000</Keywords>
<TimeCreated SystemTime="2011-02-14T23:12:37.000Z" />
<EventRecordID>34500</EventRecordID>
<Channel>System</Channel>
<Computer>Removed for security</Computer>
<Security />
</System>
<EventData>
<Data>%%860</Data>
<Data>3.0.8107.0</Data>
<Data>{79A27CE3-F762-45FC-8CD8-B95DF3C298F4}</Data>
<Data>2011-02-14T23:12:07.157Z</Data>
<Data>
</Data>
<Data>
</Data>
<Data>2147607809</Data>
<Data>Rogue:Win32/FakeRean</Data>
<Data>5</Data>
<Data>Severe</Data>
<Data>8</Data>
<Data>Trojan</Data>
<Data>http://go.microsoft.com/fwlink/?linkid=37020&name=Rogue:Win32/FakeRean&threatid=2147607809</Data>
<Data>1</Data>
<Data>
</Data>
<Data>1</Data>
<Data>2</Data>
<Data>%%820</Data>
<Data>C:\Users\Removed for security\AppData\Roaming\defender.exe</Data>
<Data>NT AUTHORITY\SYSTEM</Data>
<Data>
</Data>
<Data>process:_pid:3920</Data>
<Data>0</Data>
<Data>%%844</Data>
<Data>3</Data>
<Data>%%848</Data>
<Data>1</Data>
<Data>%%821</Data>
<Data>0</Data>
<Data>9</Data>
<Data>%%887</Data>
<Data>
</Data>
<Data>0x00000000</Data>
<Data>The operation completed successfully. </Data>
<Data>
</Data>
<Data>0</Data>
<Data>0</Data>
<Data>No additional actions required</Data>
<Data>
</Data>
<Data>
</Data>
<Data>AV: 1.97.1671.0, AS: 1.97.1671.0, NIS: 9.1.0.0</Data>
<Data>AM: 1.1.6502.0, NIS: 2.0.5854.0</Data>
</EventData>
</Event>
February 14th, 2011 9:53pm