Windows Foolproof Protector
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 100 % (High) |
Infected Computers: | 3 |
First Seen: | April 13, 2012 |
OS(es) Affected: | Windows |
Since early 2012, ESG malware analysts have been receiving reports of a large batch of rogue security applications in the FakeVimes family of malware. Although this family of rogue security programs has been active and continually updated since 2009, this recent release includes a dangerous rootkit component that can be quite difficult to remove.
Windows Foolproof Protector is one of the dozens of clones in this batch of FakeVimes prorgams that include that rootkit component. ESG malware researchers have identified this rootkit as a variant of the infamous ZeroAccess infection. This means that, even though most security programs can remove FakeVimes malware quite easily, FakeVimes rogue anti-virus programs released in this 2012 batch are particularly difficult because they require a specialized anti-rootkit tool.
There are dozens of clones of Windows Foolproof Protector with new ones being detected every day. Some examples of these include malware with names like Virus Melt, Presto TuneUp, Fast Antivirus 2009, Extra Antivirus, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, PC Live Guard, Live PC Care, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus, Smart Security, Windows Protection Suite, Windows Work Catalyst. ESG security analysts recommend using an appropriate anti-malware program containing anti-rootkit technology to remove Windows Foolproof Protector's crucial associated rootkit component.
Table of Contents
A Brief Description of How Windows Foolproof Protector Attempts to Steal Your Money
The Windows Foolproof Protector scam has been around unaltered for nearly a decade in some version or another. Basically, criminals create malware which they then market as an anti-virus or anti-malware program. By programming their malware so that it will display error messages and alarming security alerts, criminals can make their victims panic in order to convince them to purchase or 'register' their fake security program. The Windows Foolproof Protector scam follows this model faithfully. However, Windows Foolproof Protector contains some nasty components designed to detect real security software on the victim's computer and to disable it. Windows Foolproof Protector can also disable vital Windows components like System Restore, the Registry Editor and the Task Manager in order to make the removal of Windows Foolproof Protector much more difficult for the victim. If Windows Foolproof Protector's self-defense features are making removal of this threat difficult, it is often effective to start up Windows in Safe Mode. This can prevent some of Windows Foolproof Protector's more nasty components from starting up automatically, giving the victim a chance to use a powerful anti-malware tool to detect and destroy Windows Foolproof Protector.
SpyHunter Detects & Remove Windows Foolproof Protector
Windows Foolproof Protector Video
Tip: Turn your sound ON and watch the video in Full Screen mode.
File System Details
# | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|---|
1. | Protector-efhc.exe | 393af3c7306664675f094c1ad1f04d6f | 2 |
2. | Protector-oerw.exe | e2610eadd19e12e745cafbc8662d6c45 | 1 |
3. | %AppData%\NPSWF32.dll | ||
4. | %AppData%\Protector-.exe | ||
5. | %AppData%\result.db | ||
6. | %Desktop%\Windows Foolproof Protector.lnk | ||
7. | %CommonStartMenu%\Programs\Windows Foolproof Protector.lnk |