Windows Processes Accelerator
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 20 % (Normal) |
Infected Computers: | 12 |
First Seen: | April 7, 2012 |
Last Seen: | July 10, 2022 |
OS(es) Affected: | Windows |
Computer users have been fooled into paying for a fake security program that goes by the name of Windows Processes Accelerator. This fake security tool has an interface that closely mimics Microsoft Security Center while providing none of its actual functions. Windows Processes Accelerator has no real security functions, mainly designed to display fake security alerts and error messages in order to trick computer users into paying for a useless bogus security tool. Windows Processes Accelerator is often part of a multi-component malware attack that includes a rootkit component that protects Windows Processes Accelerator from detection and removal.
Windows Processes Accelerator itself is installed with the help of a dropper Trojan and is part of a large family of malware known as the FakeVimes family of rogue security software. Since 2009, malware in the FakeVimes family has harassed computer users into purchasing useless fake security software. Recently-discovered clones of Windows Processes Accelerator include such fake security programs as Virus Melt, Presto TuneUp, Fast Antivirus 2009, Extra Antivirus, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, PC Live Guard, Live PC Care, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus, Smart Security, Windows Protection Suite, Windows Work Catalyst.
These all have identical interfaces as Windows Processes Accelerator with only slight changes to their file and application names to distinguish them from each other. If your computer system is exhibiting a higher than normal amount of security alerts and that a security program like the ones listed above has been installed, it is very likely that your computer is the target of a malware scam.
Table of Contents
How Criminals Use Windows Processes Accelerator to Steal Your Money
Criminals use Windows Processes Accelerator to take advantage of inexperienced computer users. It will display misleading messages and fake scans of the victim's computer system claiming that it is severely infected. ESG security analysts have also found that Windows Processes Accelerator has the capacity to make your system unstable and slow as well as affecting how you access the Internet or whether you can open certain files. All of these problems add up so that an inexperienced computer user will believe the claims that Windows Processes Accelerator makes about the computer system being infected with malware. Windows Processes Accelerator will direct the victim constantly to its own website where the victim is invited to provide credit card information in order to buy a useless "full version" of Windows Processes Accelerator. Of course, since Windows Processes Accelerator has no real anti-malware capabilities, this is a waste of money at the very least.
Windows Processes Accelerator Video
Tip: Turn your sound ON and watch the video in Full Screen mode.
File System Details
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | %AppData%\Protector-[RANDOM 3 CHARACTERS].exe | |
2. | %AppData%\NPSWF32.dll | |
3. | %Desktop%\Windows Processes Accelerator.lnk | |
4. | %CommonStartMenu%\Programs\Windows Processes Accelerator.lnk | |
5. | %AppData%\result.db |
Registry Details
URLs
Windows Processes Accelerator may call the following URLs:
pornvideoshd.xyz |