One of the oldest tricks used by rogue antivirus products is to use a similar name as, or have a similar look and feel to, legitimate security software. It’s been commonplace for them to mimic the Windows Security Center.
This one calls itself “Security Essentials 2010” and looks something like this:
So it was inevitable that the day would arrive when a rogue would masquerade as something similar to Microsoft Security Essentials.
Apart from terminating processes, it lowers a number of security settings in the registry, and changes the desktop background to display a rather alarming message.
It also modifies the registry in an attempt to prevent this background from being changed again.
Furthermore, it also downloads and installs a Win32/Alureon component, and another Layered Service Provider (LSP) component, also detected as Trojan:Win32/Fakeinit. This LSP monitors the TCP traffic sent by various Web browsers that the user might have installed, and blocks any traffic to certain domains.
Read more at Microsoft.