Microsoft Anti-Xploit Guard Email Scam: Fake Security Update Warning Explained

It looks like a routine Microsoft notice: a “critical security update,” a specific KB number, a file size, and a simple “Update now” button.

That’s exactly why it works.

The “Microsoft Anti-Xploit Guard Released A Security Update” email is a phishing and malware delivery scam. It tries to rush you into downloading and running an executable such as “Microsoft_Anti-Xploit_Update.exe” by using urgent language and the appearance of a legitimate Windows patch. Real Microsoft security updates are delivered through Windows Update or approved enterprise tools, not unsolicited emails with .exe downloads.

scam

Scam Overview

What this scam claims to be

The message presents itself as a security alert from Microsoft, telling you that a “critical security update” is required to protect your device.

Most versions follow the same pattern:

  • A subject line like “Microsoft security update”
  • An urgent heading like “Important security update required”
  • A claim that a tool called “Microsoft Anti-Xploit Guard” released a patch
  • A patch identifier meant to look real, commonly “Security Update KB5021234”
  • A big call-to-action button such as “Update now”
  • A “manual download” option pointing to an executable file, typically “Microsoft_Anti-Xploit_Update.exe”
  • A deadline threat, often: “This update will install automatically in 3 days if not installed manually”

The email is crafted to feel like a standard maintenance message. It is short, formatted like a product notice, and tries to sound calm while still pressuring you to act.

That combination is deliberate.

Scammers know that pure panic triggers suspicion. So instead, they aim for “responsible urgency,” the feeling that you are simply doing a sensible security task that should not be delayed.

Why “Anti-Xploit Guard” is a big red flag

One of the most important tells is the name itself.

Windows has legitimate exploit-mitigation and intrusion-prevention features. For example, Windows Defender Exploit Guard was introduced as a set of protections to reduce attack surface and harden systems against common malware and exploit techniques.

But “Microsoft Anti-Xploit Guard” is not a standard Microsoft product name that regular consumers install via emailed patches. The phrasing is “close enough” to sound plausible, especially if you have heard terms like “Exploit Guard,” “Exploit Protection,” or “Anti-exploit mitigation.”

This is a classic impersonation technique: use naming that resembles real security components, add a patch number, and rely on the recipient to fill in the rest.

The scam uses a real-looking KB number to borrow credibility

The email often references “KB5021234” to sound like a real Microsoft update. The problem is that it is being used as theater.

KB5021234 is associated with a legitimate Windows update from December 2022 for Windows 11 (OS Build 22000.1335).

That matters for two reasons:

  1. It makes the email feel authentic. People have seen “KB” numbers in update history before.
  2. It makes quick Googling confusing. A user might search “KB5021234” and find real Microsoft pages, then assume the email must be legitimate.

Scammers love details that are “technically true in isolation” but misused in context.

The file size and “5 minutes” promise are part of the illusion

Many versions include specific numbers, such as:

  • “Size: 67.5 MB”
  • “Time required: About 5 minutes”

These details are not included to help you. They are included to reduce doubt.

If something has a file size and an install time, it feels like a normal update process. But when you compare this to real update distribution, the story falls apart.

For example, the Microsoft Update Catalog listing for KB5021234 shows sizes far larger than 67.5 MB for common packages (hundreds of MB).

Even if file sizes vary by device and update type, the bigger point is this: legitimate Windows updates are delivered through Windows Update and trusted Microsoft channels, not via a random emailed executable.

What the email is actually trying to do

The goal is to get you to click one of two paths:

  • The “Update now” link
  • The “manual download” link

Both routes lead to a malicious download. The campaign commonly pushes an executable named “Microsoft_Anti-Xploit_Update.exe,” which is designed to look like an official patch installer. (PCRisk)

Once executed, the malware can be used for a range of outcomes, depending on what the attacker deploys:

  • Remote access trojans (attackers can control the device remotely)
  • Information stealers (passwords, browser data, financial details)
  • Cryptocurrency miners (using your system resources silently)
  • Ransomware (locking files and demanding payment)
  • Other payloads that enable persistence and further compromise (PCRisk)

Not every victim will see the same “symptoms,” which makes this scam even more dangerous. Some infections are noisy. Many are quiet.

What a typical scam email looks like

A typical example includes language like this (formatting varies):

Subject: Microsoft security update

Important security update required

Update your security software to protect your device

Microsoft Anti-Xploit Guard has released a critical security update. Install this update to keep your device protected from the latest threats.

Update: Anti-Xploit Guard Security Update KB5021234

Size: 67.5 MB

Time required: About 5 minutes

This update includes important security improvements to protect against new exploits and vulnerabilities.
Update now

Manual download option:
Download update file manually

File: Microsoft_Anti-Xploit_Update.exe (Security Patch KB5021234)

Microsoft Corporation

This update will install automatically in 3 days if not installed manually.

This exact structure has been documented in reporting on the campaign and matches what many victims describe receiving.

Why this scam works so well

This campaign is effective because it targets three very human instincts:

1) “Security chores are normal”

People are trained to accept updates as routine. Pop-ups, restarts, patches, and “critical fixes” are part of modern life. The scam rides that habit.

2) Fear of being the one who ignored a warning

The message frames inaction as irresponsible: “If you do not install it, you will be exposed.” That fear pushes clicking.

3) The illusion of precision

A patch number, a file size, and a timer feel specific. Specific feels trustworthy. But in scams, specific is often just decoration.

The clearest warning signs

If you want the fast checklist, here it is. This email is a scam if you see any of the following:

  • You received a “Microsoft security update” through email rather than Windows Update
  • The email includes an executable download (.exe) or a link to download one
  • The message uses urgency tactics: deadlines, countdowns, “automatic install in 3 days”
  • The sender address does not match an official Microsoft domain
  • Hovering over links shows a non-Microsoft destination
  • The product name is odd or unfamiliar (“Anti-Xploit Guard”)
  • The email asks you to “manually install” a patch from a file attachment or download

Microsoft’s own phishing guidance is clear: if an email is suspicious or unexpected, do not open links or attachments, and verify the destination by hovering instead of clicking. (Microsoft Support)

That advice applies perfectly here.

How The Scam Works

This campaign is not complicated technically. It is effective because it is psychologically smooth.

Below is how it typically unfolds, step by step, including the small details that make it convincing.

Step 1: The scammers pick a theme that people already trust

Security updates are the perfect disguise because they meet three conditions:

  • People already expect them
  • People fear missing them
  • People do not fully understand how they work

Most users cannot describe the difference between Windows Update, the Microsoft Update Catalog, and enterprise patch management. Attackers do not need you to understand it. They only need you to feel that “this seems normal.”

The “Anti-Xploit Guard” wording is especially clever because it resembles legitimate exploit protection concepts and sounds like something advanced that you would not question.

Step 2: They craft an email that looks like a routine product notice

A lot of phishing emails fail because they are too dramatic. This one often reads like a status notification:

  • Short paragraphs
  • Clean bullet-like lines
  • A single clear instruction: install the update
  • A backup option: manual download
  • A small threat: it will auto-install soon

That structure reduces resistance.

Instead of making you feel like you are being scammed, it makes you feel like you are simply completing a necessary task.

Step 3: They inject urgency without sounding hysterical

The deadline line is one of the most manipulative parts:

  • “This update will install automatically in 3 days if not installed manually.”

That sentence pushes you into action while pretending to offer you control.

It implies:

  • The update is real
  • The update is coming anyway
  • Manual install is “faster” or “safer”
  • You should do it now to avoid disruption

But legitimate Windows updates are not delivered this way. The “3 days” pressure is purely psychological.

Step 4: They offer two buttons that lead to the same bad outcome

The email commonly includes:

  • A primary button: “Update now”
  • A secondary link: “Download update file manually”

This is not generosity. It is conversion optimization.

Different users respond to different triggers:

  • Some trust buttons and click fast.
  • Others distrust buttons but trust a “manual download” that feels more technical and controlled.

Either way, the goal is the same: get you to download the executable.

Step 5: The malicious download is dressed up like a real installer

The file name “Microsoft_Anti-Xploit_Update.exe” is intentionally boring.

A lot of malware gets caught because the file name looks weird. This one is built to look like it belongs on a corporate network share.

It may arrive in different wrappers:

  • Direct .exe download
  • A ZIP archive containing the .exe
  • A disguised installer with a generic icon
  • A web page that looks like a download portal

The consistent point is that it wants you to run an executable that did not come from an official update channel.

Step 6: The moment you run it, the scam moves from “phishing” to “device compromise”

This is the turning point.

Clicking the email link is risky, but running the file is where the real damage starts. At that stage, the attacker’s code is on your machine, and what happens next depends on the payload.

Reporting on the campaign notes that the downloaded file may deliver a range of malware types, including:

  • Remote access trojans
  • Information stealers
  • Cryptocurrency miners
  • Ransomware

That range is important. It means two victims can have two completely different experiences, even from the same email template.

Step 7: Common behaviors after infection

Here is what malware commonly does after execution. You may not see all of these, but understanding them helps you respond correctly.

Establish persistence

The malware tries to survive reboots so it can keep running.

This can involve adding itself to startup locations, scheduled tasks, or other auto-run mechanisms. The goal is simple: stay on the system long enough to extract value.

Steal credentials and browser data

Information stealers often target:

  • Saved passwords in browsers
  • Autofill data
  • Session cookies (which can allow account access even without a password)
  • Crypto wallet browser extensions
  • Email logins and cloud accounts

This is why changing passwords only on the infected machine can be risky. You want a clean device for that step.

Open a remote control channel

A remote access trojan gives an attacker a live foothold.

That can lead to:

  • installing additional malware
  • searching for sensitive files
  • capturing screenshots or keystrokes
  • moving laterally to other devices on the network

Trigger ransomware or extortion

Some infections end with encryption or blackmail. Others quietly steal data first, then threaten exposure.

Even if you do not see ransom notes, you should treat any execution as serious.

Step 8: Why the scam wants you to act fast

Speed reduces verification.

If you pause for 2 minutes, you might:

  • Check Windows Update and see nothing urgent
  • Hover over the link and notice a strange domain
  • Ask your IT team
  • Remember that real updates do not arrive as emailed executables

That is exactly what scammers do not want.

This is why Microsoft’s guidance focuses on slowing down: do not click unexpected links or attachments, verify destinations, and use built-in reporting features instead.

Step 9: The credibility trick most people miss

The campaign’s smartest move is using something real (a KB number) in a fake context.

KB5021234 is a legitimate Microsoft update identifier from December 2022.

So when a victim searches the KB number, they may find official pages and think:

“I found it. It exists. So this email must be real.”

But legitimate updates do not require you to download “Microsoft_Anti-Xploit_Update.exe” from an email. The KB number is being used like a costume.

Step 10: How to verify safely, without guessing

If you receive this email and want to double-check your system, do it like this:

  • Open Settings
  • Go to Windows Update
  • Click Check for updates
  • Install updates only from that interface (or approved enterprise tools)

Microsoft’s Windows Update guidance shows how users should check for updates manually through Settings, not through emailed download links.

If you want to confirm a specific KB, you can also verify through official Microsoft support pages or the Microsoft Update Catalog, but only by navigating there directly, not through an email link.

How to Remove the “Microsoft Anti-Xploit Guard Security Update” Malware

If you clicked the link or ran the downloaded file, treat this as a real device compromise, not just a “spam email.” The goal is to stop any active malware, remove persistence, and secure your accounts without accidentally making things worse.

The steps below walk you through a clean, practical removal process, including what to do first, how to scan properly, what to reset afterward, and when a full reinstall is the safest option.

STEP 1: Uninstall malicious programs from Windows

In this first step, we will manually check if any unknown or malicious programs are installed on the computer. Sometimes adware and browser hijackers can have a usable Uninstall entry that can be used to remove them.

Windows 11Windows 10Windows 8Windows 7
  1. Press the Windows key + I on your keyboard to open the Settings app.

    First, open Windows Settings by pressing Windows+I on your keyboard. You can also right-click your Start button and select “Settings” from the list.
    Windows 11 Open Settings

  2. In the Settings app, click on “Apps” and then “Apps & features”.

    When Settings opens, click “Apps” in the sidebar, then select “Apps & Features”.

    Windows 11 Apps and Feature

  3. Find the malicious program in the list of installed apps and uninstall it.

    In Apps & Features settings, scroll down to the app list and search for unknown or suspicious programs. To make things easier, you can sort all installed programs by their installation date. To do this, click “Sort by” and select “Install date”.
    Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. When you find a malicious program, click the three dots button beside it and select “Uninstall” in the menu that appears.

    Windows 11 Uninstall malicious program

    If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.
  4. Follow the prompts to uninstall the program.

    In the next message box, confirm the uninstall process by clicking on Uninstall, then follow the prompts to uninstall the malicious program.
    Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read them closely.

    Windows 11 Confirm Uninstall

  1. Press the Windows key + I on your keyboard to open the Settings app.

    Press the Windows key + I on your keyboard to open the Settings app. You can also ope the Settings app by clicking the Start button on the taskbar, then select “Settings” (gear icon).
    Windows 10: Click the Start button then click on Settings

  2. In the Settings app, click on “Apps”.

    When the “Windows Settings” window opens, click on “Apps“. By default, it should open “Apps and Features” but if it doesn’t, select it from the list on the left.

    Windows 10: Click on Apps

  3. Find the malicious program in the list of installed apps and uninstall it.

    In Apps & Features settings, scroll down to the app list and search for unknown or suspicious programs. To make things easier, you can sort all installed programs by their installation date. To do this, click “Sort by” and select “Install date”.
    Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. When you find a malicious program, click on it and select “Uninstall” in the menu that appears.

    Windows 10: Uninstall malware from Windows

    If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.
  4. Follow the prompts to uninstall the program.

    In the next message box, confirm the uninstall process by clicking on Uninstall, then follow the prompts to uninstall the malicious program.
    Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
    Windows 10: Complete the uninstall process

  1. Go to “Program and Features”.

    Right-click on the Start button in the taskbar, then select “Programs and Features”. This will take you directly to your list of installed programs.
    Right click on Start and select Programs and Features

  2. Search for malicious program and uninstall it.

    The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find any unknown or suspicious program, then click to highlight it, then click the “Uninstall” button.

    Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.

    If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.

    Select malicious program then click on Uninstall

  3. Follow the on-screen prompts to uninstall malicious program.

    In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall malicious program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.

  1. Open the “Control Panel”.

    Click on the “Start” button, then click on “Control Panel“.
    Windows 7 go to Control Panel

  2. Click on “Uninstall a Program”.

    When the “Control Panel” appears, click on “Uninstall a Program” from the Programs category.
    Select Uninstall malicious program from Control Panel

  3. Search for malicious programs and uninstall them.

    The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find any suspicious or unknown program, then click to highlight it, then click the “Uninstall” button.
    Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.

    If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.

    Uninstall malware from Windows 7

  4. Follow the on-screen prompts to uninstall malicious program.

    In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall malicious program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.

If you are experiencing difficulty while attempting to uninstall a program, you can use Revo Uninstaller to completely remove the unwanted program from your computer.

Now that the malicious programs have been removed from your computer, we can proceed with the next step in this guide.

STEP 2: Reset browsers back to default settings

In this step, we will remove spam notifications,  malicious extensions, and change to default any settings that might have been changed by malware.
Please note that this method will remove all extensions, toolbars, and other customizations but will leave your bookmarks and favorites intact. For each browser that you have installed on your computer, please click on the browsers tab below and follow the displayed steps to reset that browser.

ChromeFirefoxMicrosoft EdgeInternet Explorer
Reset Chrome for Windows to default settings

We will now reset your Chrome browser settings to their original defaults. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.

  1. Open the Chrome menu

    In the top-right corner of Chrome, click the three-dot (⋮) icon to open the menu.

    Chrome 1a
  2. Go to Settings

    From the menu, select Settings.

    Chrome 1b
  3. Select “Reset settings”

    In the left sidebar, scroll down and click Reset settings.

    Chrome 2
  4. Choose “Restore settings to their original defaults”

    Click the Restore settings to their original defaults option.

    Chrome 3 1
  5. Confirm the reset

    In the dialog that appears, click Reset settings to restore Chrome to its default state. Bookmarks, history, and saved passwords will remain, but extensions will be disabled and temporary data cleared.

    Chrome 4
Reset Firefox for Windows to default settings

We will now reset your Firefox browser settings to their default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.

  1. Click the three horizontal lines in the top-right corner and then click on “Help”.

    Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
    Click on the Firefox Menu button then select Help button

  2. Click “More troubleshooting information”.

    From the Help menu, click on “More troubleshooting information“.
    Click More Troubleshooting Information

  3. Click on “Refresh Firefox”

    When the “Troubleshooting Information” page opens, click on the “Refresh Firefox” button.
    Click on Refresh Firefox

  4. Confirm that you want to reset your browser settings.

    To finish the reset process, click on the “Refresh Firefox” button in the new confirmation window that opens.
    Click again on Refresh Firefox button

  5. Click “Finish”.

    Firefox will now close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on “Finish“.

    Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.

Reset Microsoft Edge to default settings

We will now reset your Microsoft Edge browser settings to their default. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.

  1. Click the three dots in the top-right corner and then click on “Settings”.

    In the top right corner, click on Microsoft Edge’s main menu button, represented by three horizontal dots. When the drop-down menu appears, click on “Settings“.
    Click the three dots in the top-right corner and then click on Settings

  2. Click on “Reset Settings”.

    On the left side of the window, click on “Reset Settings“.
    Click Reset Settings option

  3. Click on “Restore settings to their default values”.

    In the main window, click on “Restore settings to their default values“.
    Select Restore settings to their default values

  4. Click “Reset”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset” button.
    Click Reset to reset your browser
    Microsoft Edge will now erase all your personal data, browsing history, and disable all installed extensions. Your bookmarks, though, will remain intact and still be accessible.

Reset Internet Explorer to default settings

We will now reset your Internet Explorer browser settings to their default. You can reset Internet Explorer settings to return them to the state they were in when Internet Explorer was first installed on your computer.

  1. Go to “Internet Options”.

    Open Internet Explorer, click on the gear icon in the upper-right part of your browser, then select “Internet Options“.

  2. Select the “Advanced” tab, then click “Reset”

    In the “Internet Options” dialog box, select the “Advanced” tab, then click on the “Reset” button.

  3. Click on “Reset”.

    In the “Reset Internet Explorer settings” section, select the “Delete personal settings” checkbox, then click on the “Reset” button.

  4. Click on “Close”.

    When Internet Explorer has completed its task, click on the “Close” button in the confirmation dialogue box.
    Close your browser and then you can open Internet Explorer again.

STEP 3: Use Rkill to terminate suspicious programs.

In this thrid step, we will download and run Rkill to terminate suspicious programs that may be running on your computer.

RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then removes incorrect executable associations and fixes policies that stop us from using certain tools.

  1. Download Rkill.

    You can download RKill to your computer from the below link. When at the download page, click on the Download Now button labeled iExplore.exe. We are downloading a renamed version of Rkill (iExplore.exe) because some malware will not allow processes to run unless they have a certain filename.

    RKILL DOWNLOAD LINK

    (The above link will open a new page from where you can download Rkill)
  2. Run RKill.

    After downloading, double-click the iExplore.exe icon to kill malicious processes. In most cases, downloaded files are saved to the Downloads folder.
    The program may take some time to search for and end various malware programs.

    RKILL Window

    When it is finished, the black window will close automatically and a log file will open. Do not restart your computer. Proceed to the next step in this guide.

STEP 4: Use Malwarebytes to remove for Trojans and Unwanted Programs

In this next step, we will we will install Malwarebytes to scan and remove any infections, adware, or potentially unwanted programs that may be present on your computer.

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

STEP 5: Use HitmanPro to remove Rootkits and other Malware

In this fifth step, while the computer is in normal back, we will download and run a scan with HitmanPro to remove Trojans, rootkits, and other malicious programs.

HitmanPro is a second-opinion scanner that takes a unique cloud-based approach to malware scanning. HitmanPro scans the behavior of active files and also files in locations where malware normally resides for suspicious activity. If it finds a suspicious file that’s not already known, HitmanPro sends it to its clouds to be scanned by two of the best antivirus engines today, which are Bitdefender and Kaspersky.

Although HitmanPro is shareware and costs $24.95 for 1 year on 1 PC, there is no limit on scanning. The limitation only kicks in when there is a need to remove or quarantine detected malware by HitmanPro on your system and by then, you can activate the one-time 30-days trial to enable the cleanup.

  1. Download HitmanPro.

    You can download HitmanPro by clicking the link below.

    HITMANPRO DOWNLOAD LINK
    (The above link will open a new web page from where you can download HitmanPro)
  2. Install HitmanPro.

    When HitmanPro has finished downloading, double-click on “hitmanpro.exe” (for 32-bit versions of Windows) or “hitmanpro_x64.exe” (for 64-bit versions of Windows) to install this program on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on the HitmanPro file

    You may be presented with a User Account Control pop-up asking if you want to allow HitmanPro to make changes to your device. If this happens, you should click “Yes” to continue with the installation.

    Windows asking for permissions to run the HitmanPro setup

  3. Follow the on-screen prompts.

    When HitmanPro starts you will be presented with the start screen as shown below. Click on the “Next” button to perform a system scan.

    Click Next to install HitmanPro on your PC

    HitmanPro final installer screen

  4. Wait for the HitmanPro scan to complete.

    HitmanPro will now begin to scan your computer for malicious programs.
    HitmanPro scans your computer for any infections, adware, or potentially unwanted programs that may be present

  5. Click on “Next”.

    When HitmanPro has finished the scan, it will display a list of all the malware that it has found. Click on the “Next” button to have HitmanPro remove the detected items.

    HitmanPro scan summary. Click Next to remove malware

  6. Click on “Activate free license”.

    HitmanPro may now require to activate the free 30-days trial to remove the malicious files. To do this, click on the “Activate free license” button to begin the free 30 days trial and remove all the malicious files from your computer.
    Click on the Activate free license button

    When the malware removal process is complete, it will display a screen that shows the status of the various programs that were removed. At this screen, you should click on the Next button and then if prompted you should click on the Reboot button. If HitmanPro does not prompt you to reboot, please just click on the Close button.

STEP 6: Use AdwCleaner to remove Malicious Browser Policies and Adware

In this next step, we will use AdwCleaner to remove malicious browser policies and unwanted browser extensions from your computer.

AdwCleaner is a free popular on-demand scanner that can detect and remove malware that even the most well-known anti-virus and anti-malware applications fail to find. This on-demand scanner includes a lot of tools that can be used to fix the side effects of adware. browser hijackers and other malware.

  1. Download AdwCleaner.

    You can download AdwCleaner by clicking the link below.

    ADWCLEANER DOWNLOAD LINK

    (The above link will open a new web page from where you can download AdwCleaner)
  2. Double-click on the setup file.

    Double-click on the file named “adwcleaner_x.x.x.exe” to start AdwCleaner. In most cases, downloaded files are saved to the Downloads folder.
    Download AdwCleaner on your computer

    AdwCleaner program will now open and you will be presented with the program’s license agreement. After you read it, click on the I agree button if you wish to continue. If Windows prompts you as to whether or not you wish to run AdwCleaner, please allow it to run.

    Windows ask if you want to run AdwCleaner

  3. Enable “Reset Chrome policies” to remove malicious browser policies.

    When AdwCleaner starts, on the left side of the window, click on “Settings” and then enable “Reset Chrome policies“.

    Enable Reset Chrome policies to remove malicious browser policies

  4. Click on the “Scan” button.

    On the left side of the AdwCleaner window, click on “Dashboard” and then click “Scan” to perform a computer scan.

    Click on Scan to start a AdwCleaner scan

  5. Wait for the AdwCleaner scan to finish.

    AdwCleaner will now scan your computer for malware. This process can take a few minutes.

    AdwCleaner scanning for adware and other malware

  6. Click on “Quarantine” to remove malware.

    When the AdwCleaner scan is completed it will display all of the items it has found. Click on the “Quarantine” button to remove the malicious programs from your computer.

    Click on Quarantine to remove malware

  7. Click on “Continue” to remove the malicious programs.

    AdwCleaner will now prompt you to save any open files or data as the program will need to close any open programs before it starts to clean. Click on the “Continue” button to finish the removal process.
    Click Continue to remove malicious files

    AdwCleaner will now delete all detected malware from your computer. When the malware removal process is complete, you may be asked to restart your computer.

STEP 7: Perform a final check with ESET Online Scanner

This final step involves installing and running a scan with ESET Online Scanner to check for any additional malicious programs that may be installed on the computer..

ESET Online Scanner is a free second-opinion scanner, designed to rescue your computer from malware (viruses, trojans, rootkits, etc.) that have infected your computer despite all the security measures you have taken (such as anti-virus software, firewalls, etc.).

  1. Download ESET Online Scanner.

    You can download ESET Online Scanner by clicking the link below.

    ESET ONLINE SCANNER DOWNLOAD LINK

    (The above link will open a new web page from where you can download ESET Online Scanner)
  2. Double-click on esetonlinescanner.exe to run the installer.

    When ESET Online Scanner has finished downloading, double-click on “esetonlinescanner.exe” to install it program on your computer. In most cases, downloaded files are saved to the Downloads folder.
    Image - Double-click on the ESET Online Scanner setup file

  3. Install ESET Online Scanner.

    When ESET Online Scanner starts you will be presented with the start screen as shown below. Select your desired language from the drop-down menu and click Get started.

    Image - Click Get Started to install ESET Online Scanner

    In the Terms of use screen, click Accept.
    Image - Accept Terms to Install ESET Online Scanner

    Select your preference for the Customer Experience Improvement Program and the Detection feedback system and click Continue.
    Image - Follow the on-screen prompts

  4. Start a Full Scan with ESET Online Scanner

    Click on Full Scan to perform an in-depth inspection of the entire computer.

    Start a Full Scan with ESET Online Scanner

    Select Enable for Detection of Potentially Unwanted Applications, then click Start scan.

    Image - Enable PUA Detection and Start Scan

  5. Wait for the ESET Online Scanner scan to finish.

    ESET Online Scanner will now begin to scan your computer for malware. This process can take quite a while, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.

    Image- Wait for the ESET Online Scanner scan to finish

  6. ESET Online Scanner will automatically remove the malicious files.

    At the end of the scan, the Found and resolved detections screen will be displayed. You can click View detailed results to view specific information. Detected threats are automatically cleaned and quarantined.
    Image - ESET Online Scanner malware removal

What To Do If You Have Fallen Victim to This Scam

If you clicked the link but did not download anything, your risk is lower, but you should still take precautions.

If you downloaded the file but did not run it, treat it as a near miss and clean up carefully.

If you ran the file, assume your device could be compromised and respond immediately.

Here is a calm, practical step-by-step plan.

  1. Disconnect the affected device from the internet
    Turn off Wi-Fi or unplug the Ethernet cable. This can interrupt malware communication and reduce the chance of data being sent out.
  2. Do not “test it again”
    Do not reopen the file to see what it does. Do not click the email links again. Close the email and leave it alone.
  3. If you are on a work device, notify IT or security right away
    In an organization, timing matters. A fast report can prevent spread to shared drives, inboxes, or other endpoints.
  4. Delete the downloaded file and empty your Recycle Bin
    If you did not run it, deleting it helps, but do not assume that deletion alone is enough if you executed it even once.
  5. Run a full security scan using a trusted tool
    On Windows, start with built-in protections and a full scan. If available, run an offline scan option as well. If your security tool flags anything, follow its remediation steps.
  6. Update Windows through official channels only
    Go to Windows Update in Settings and install all pending updates. This helps close known vulnerabilities and ensures your system is current.
  7. Change passwords from a clean device, not the infected one
    If the file was executed, assume credentials may be at risk. Use a different device you trust (or a freshly scanned one) to change:
  • Your email password first
  • Your Microsoft account password
  • Banking and payment passwords
  • Any account that shares the same password
  1. Turn on multi-factor authentication wherever possible
    MFA can stop attackers even if they stole a password. Prioritize email, financial accounts, and any admin accounts.
  2. Review account security activity and logged-in sessions
    Many services let you see recent logins and active sessions. Look for unfamiliar devices, locations, or times.
  3. Watch your financial accounts closely
    If you entered credentials, monitor bank and card transactions. If you see suspicious activity, contact your bank immediately.
  4. Check for signs of additional compromise
    Be alert to:
  • New browser extensions you did not install
  • Antivirus disabled unexpectedly
  • Strange startup programs
  • Unexpected admin prompts
  • Performance spikes that could indicate mining

None of these prove infection, but they justify deeper checking.

  1. Consider a clean reinstall if you executed the file and suspect compromise
    For serious infections, the most reliable fix is backing up essential files (carefully) and reinstalling the operating system, then restoring only what you need.

If you do this, change passwords after the reinstall, not before.

  1. Report the phishing email through your email client
    Use the built-in phishing report tools if available. This helps providers block similar messages for others.

Microsoft’s phishing guidance emphasizes not interacting with suspicious attachments or links and using reporting features when possible.

  1. Learn the “never again” rules that stop this scam cold
    For the future, make these non-negotiable habits:
  • Never install “security updates” from email links
  • Never run an unexpected .exe you downloaded from an email
  • Always update via Windows Update or approved IT tools
  • Hover over links before clicking
  • When in doubt, navigate to the official site manually

These steps are simple, but they shut down most malware delivery attempts.

The Bottom Line

The “Microsoft Anti-Xploit Guard Released A Security Update” email is not a helpful warning. It is a malware delivery scheme dressed up as routine maintenance. As documented in current reporting on this specific campaign (dated February 6, 2026), the email’s links lead to a malicious executable commonly presented as “Microsoft_Anti-Xploit_Update.exe.”

If you received it, do not click. Do not download. Do not run anything.

Check for updates the real way through Windows Update, keep your security tools active, and treat any emailed “manual patch installer” as a major red flag. If you already interacted with the file, act quickly and methodically. Disconnect, scan, secure your accounts from a clean device, and escalate to IT if this happened in a workplace.

FAQ

Is the “Microsoft Anti-Xploit Guard security update” email real?

No. It is a phishing and malware delivery message designed to look like a legitimate security alert from Microsoft. Real Windows security updates are delivered through your system’s update mechanism, not as unsolicited emails with executable downloads.

Does Microsoft ever email security updates as attachments?

Legitimate update notifications do not require you to download and run a .exe from an email. Any message that includes an “update installer” attachment or a “manual download” button is a major red flag.

What is “Anti-Xploit Guard”? Is it a real Microsoft product?

The wording is meant to sound like real exploit protection features, but the email name itself is commonly used as a lure. Scammers often pick product-sounding labels that feel plausible to non-technical users.

The email mentions “KB5021234.” Does a real KB number mean the email is safe?

No. Attackers frequently reuse real-looking KB numbers to build credibility. A KB reference in an email does not prove the message is legitimate, especially when it is paired with an executable download.

Why does the email include file size and “about 5 minutes” to install?

Those details are psychological. They make the message feel routine and reduce doubt. Real updates do not require you to trust a random download link just because it includes technical-looking numbers.

What happens if I click “Update now” but do not download anything?

Your risk is lower, but not zero. The link may lead to a phishing page, tracking, or additional prompts to download malware. Close the page, do not enter any credentials, and run a security scan.

What if I downloaded the file but did not run it?

Delete it immediately, empty the Recycle Bin, and run a full antivirus scan. If the file never executed, you likely avoided the worst outcome, but scanning is still smart.

What if I ran “Microsoft_Anti-Xploit_Update.exe”?

Treat the device as potentially compromised. Disconnect from the internet, run a full security scan, and change important passwords from a different, trusted device. If this is a work computer, notify IT right away.

What kind of malware can this scam install?

It varies by campaign, but common outcomes include credential theft, remote access, ransomware, or secondary downloads that install additional threats. The same email template can deliver different payloads over time.

How can I tell if my computer is infected?

Sometimes there are no obvious signs. Possible clues include new startup items, unusual CPU usage, unknown browser extensions, security tools being disabled, or new logins to your accounts. Even without symptoms, take action if you executed the file.

How do I check for updates the safe way?

Use your system’s built-in update settings. Open your Windows update settings and check for updates there. Avoid “manual patch” downloads from emails, pop-ups, or unfamiliar websites.

Should I reply to the email or contact the sender?

No. Replying confirms your address is active and can lead to more targeted attempts. Delete the message and report it as phishing in your email provider.

I entered my email password on a page linked in the message. What now?

Change your email password immediately from a clean device, enable multi-factor authentication, and review recent account activity and sign-ins. Then update passwords for any accounts that reused the same password.

Can I recover money if this led to fraud or unauthorized charges?

If you gave payment details or see suspicious transactions, contact your bank or card issuer immediately and follow their fraud process. The faster you report, the better the odds of stopping or reversing charges.

How do I report this scam?

Report it in your email client as phishing, then forward it to your organization’s IT or security team if you are on a work account. If you have the suspicious link or sender address, include it in the report without clicking it.

What are the quickest red flags to remember?

“Manual download” language for a critical patch

Any “security update” delivered by email

Any request to download or run a .exe file

Urgent deadlines like “installs automatically in 3 days”

Buttons that lead to non-official domains

You may also like

Share This Article
Thomas is an expert at uncovering scams and providing in-depth reporting on cyber threats and online fraud. As an editor, he is dedicated to keeping readers informed on the latest developments in cybersecurity and tech.
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *