To crawl away HTTPS content, fiddler must decrypt HTTPS traffic.
However, the browser will check the digital certificate and discover that the session has been bugged. To fool the browser, fiddler encrypts HTTPS traffic by using another digital certificate.
After fiddler is configured to decrypt HTTPS traffic, a CA certificate named Do_not_trust_fiddlerroot is automatically generated and used to issue a TLS certificate for each domain name.
If the Do_not_trust_fiddlerroot certificate is included in the list of trusted CAs for the browser or other software, the browser or other software will assume that the HTTPS session is trustworthy and will not eject a "certificate error" warning.
If you still get a pop-up error, delete all Do_not_trust_fiddlerroot certificates manually and then import them automatically using Fiddler. (also includes the product certificate you tested, for example my is *.morningstar.com)
Note: To open your product before importing (this will automatically find the required certificate)
Fiddler crawling HTTPS