In my opinion,antivirus companies do have trouble publishing hundreds of signatures for rogue software.Since there is much prospect for financial gain,hackers do test their fake softwares against popular security software to ensure they are not detected in the first instance.
These scareware mutate frequently to evade detection.
No security software is 100% effective.Prevention is better than cure.User education about sensible internet browsing should form part of your company security policy.
It's wise to have a backup security solution with no real time protection(To avoid conflict with SEP) to clean up missed samples of malware on computers.But here also,there is the possibility of having false positives.Striking the right balance is the job of your IT officer.Your security is as strong as the weakest link in your organisation,namely employees who invite malicious code into your network by visiting questionable sites or execute untrusted code.
IF YOU ARE GENUINELY HIT BY SECURITY TOOL:
Kill processes:
4946550101.exe
Delete registry values:
HKEY_CURRENT_USER\Software\Security Tool
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "4946550101"
Delete files:
4946550101.bat 4946550101.cfg 4946550101.exe Security Tool.lnk Security Tool.lnk
Delete directories:
%UserProfile%\Application Data\4946550101
AS A RULE,IF YOU CATCH A ROGUE SOFTWARE IN A LIMITED ACCOUNT,THE ROGUE WILL INSTALL IN THE %UserProfile%\Application Data\ FOLDER.IN CASE OF INFECTION,JUST DELETE SUSPICIOUS FILES IN THE SAID FOLDER IN SAFE MODE.