‘Warning! Infected File Detected’ Fake Alert Description and Removal Instructions

‘Warning! Infected File Detected’ Fake Alert Description (Scan your PC to Detect ‘Warning! Infected File Detected’ Fake Alert with SpyHunter)

Rogue Security Programs like the one displaying the below fake warning are nothing more than wolves in sheep’s clothing:

Warning! Infected file detected.
Suspicious activity detected in the application chrome.exe similar to the behavior of the virus Win32/Confilcker.X. For your security and to avoid loss of data, the operation of application chrome.exe has been temporarily restricted. To restore the application’s full operation, you must use the full edition of Antivirus Security Pro.

The above ‘Warning! Infected file detected’ fake alert, is associated with and promoting the rogue Antivirus Security Pro. The Web is full of textbook rogue security programs that simulate a security breach using fake alerts, warnings and reporting to freak out the PC user and get them to buy the ‘full version’ of the promoted fake anti-virus tool. Other than the name, Antivirus Security Pro is no different from neighboring rogue programs Windows Smart Warden, Windows Functionality Checker, Windows Protection Master, Home Safety Essentials, Anti-Malware Lab, System Smart Security, XP Guardian, Best Malware Protection and a long list of other clones. The basic rogue security program model follows this outline:

  • Delivered by a Trojan, a specific type of malware program known for using guises, such as presenting as something helpful or innocent like an Adobe Flash update download (a fake one).
  • Locks computer screen to a) block normal use and access to desktop, applications, browser or administrative controls and b) to command attention to its false accusations and threats:
    • Victim will be accused of having indulged in illegal online acts, such as watching child pornography, pirating, distributing email spam, etc.
    • Legal jargon will threaten jail time and excessive fines to scare the victim into submission.
    • Victim will be asked to pay a smaller fee, ransom, only to not have their system unlocked but also to avoid legal prosecution.
    • Payment method will be use a cash card service like Ukash or Moneypak because these vendors offer anonymity and thus this means the transaction will be untraceable.
  • While the victim deals with the onscreen shenanigans or trickery, the Trojan, the agent behind the deception and attack, is busy in the background doing the following:
    • Stealing data out of the browser cache and off the hard drive, so the passwords or credentials you conveniently stored are not safe!
    • Gathering system data that exposes vulnerabilities and helps plan targeted attacks.
    • Using an opened port only to not transmit stolen data but to download more malicious or unwanted programs.
    In addition to stealing money from you and reneging on the promise of ‘unlocking your system’, a hacker has plans to remotely control your computer and use the resources as follows:

    • To distribute email spam.
    • To mine Bitcoins.
    • To participate in a DNS strike
    If you did not take time to invest in a stealth and successful anti-malware solution, getting false positives may send you or someone else using your system into a panic. However, before you become the next victim of a rogue security program and help fatten the bank account of a cybercriminal, seek professional help of a tested, tried and true anti-malware solution known to uproot hidden threats and fully restore infected systems by unlocking them. Otherwise, you may end up throwing your money away or wasting valuable time chasing a mutating infection that ultimately corrupts your hard drive and that could erase valuable data permanently.

    Automatically Detect ‘Warning! Infected File Detected’ Fake Alert

    1. Download SpyHunter* Scanner to Detect ‘Warning! Infected File Detected’ Fake Alert
    2. Run a full system scan to detect Vista Home Security 2012 files.
    3. Once you've detected ‘Warning! Infected File Detected’ Fake Alert on your PC, you will then need to purchase SpyHunter to start the removal process.
    4. Reboot your PC and rerun the scan for any remaining traces of ‘Warning! Infected File Detected’ Fake Alert.

    Remove ‘Warning! Infected File Detected’ Fake Alert Manually

    Stop the following ‘Warning! Infected File Detected’ Fake Alert processes:

    Remove the following ‘Warning! Infected File Detected’ Fake Alert registry keys:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AS2014

    Locate and delete the following ‘Warning! Infected File Detected’ Fake Alert files:

Spyware Database ‘Warning! Infected File Detected’ Fake Alert