Threat Database Rogue Anti-Spyware Program Windows Command Processor

Windows Command Processor

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 539
First Seen: April 11, 2012
Last Seen: May 9, 2023
OS(es) Affected: Windows

ESG team of malware analysts has detected yet another variant in a recent batch of FakeVimes rogue security programs. Windows Command Processor fits the mold exactly, containing all the characteristics of rogue security software in the FakeVimes family, such as:

  1. Containing file names made up of three random characters,
  2. Containing components designed to stop known security programs, and
  3. Being bundled along with variants of the Sirefef or ZeroAccess.

Like most rogue security programs in the FakeVimes family, Windows Command Processor is designed to trick computer users into purchasing a false security application by alarming with a stream of fake error messages and pop-up notifications designed to resemble those used by Windows itself. Windows Command Processor's malware family is well known to PC security analysts, considering that it has been around since 2009. In fact, the main danger with this recent batch of Windows Command Processor clones is not Windows Command Processor itself, but the rootkit component that tends to accompany them. It is usually necessary to deal with this rootkit component with a specialized tool before being able to take action against Windows Command Processor itself.

Windows Command Processor has numerous clones, including such fake security programs as Virus Melt, Presto TuneUp, Fast Antivirus 2009, Extra Antivirus, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, PC Live Guard, Live PC Care, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus, Smart Security, Windows Protection Suite, Windows Work Catalyst. ESG team of malware analysts recommends using a reliable anti-malware tool to deal with a Windows Command Processor infection.

Preventing Criminals from Using Windows Command Processor to Steal Your Money

Computer users with little experience related to computer security are likely to believe that Windows Command Processor is a legitimate Windows component. However, the fact that it usually enters a computer system without authorization and appears to have no actual anti-malware capabilities should be enough to tip you off that Windows Command Processor is not the real thing. Another obvious clue is the fact that Windows Command Processor is very difficult to remove, often resisting attempts using normal methods for removing an application. The main way in which criminals profit from Windows Command Processor is by trying to sell you a 'full version' of Windows Command Processor, which proves to be just as ineffective at removing malware as the 'normal' version of this bogus security application. A Windows Command Processor infection is also often associated with general system instability, a general slowing down of the infected computer system, and problems accessing the Internet and the victim's files.

URLs

Windows Command Processor may call the following URLs:

blacklane.site

Trending

Most Viewed

Loading...