1 of 8
Danger level 9
Type: Rogue Anti-Spyware
Common infection symptoms:
  • Blocks internet connection
  • Block exe files from running
  • Installs itself without permissions
  • Connects to the internet without permission
  • Shows commercial adverts
  • Slow internet connection
  • System crashes
  • Annoying Pop-up's
  • Slow Computer
Infection Video Windows Web Commander

Windows Web Commander

Trojans, encrypted downloads, social engineering scams, spam emails, and various other security backdoors have been implemented to spread Windows Web Commander virus throughout Windows systems all around the globe. The rogue’s interface replicates the blue/red color scheme and layout of such Windows programs as Windows Security Center, which is one of the main elements that helped the fictitious application to have fooled hundreds of unsuspecting Windows users with its fake removal tool. The rogue, which has been developed and distributed by tremendously clever and knowledgeable cyber criminals – creators of the clone Windows Interactive Security, – can block your Internet connection, running of most executable files, and can even remove administrative privileges to access Registry Editor and Task Manager tools, which could be used to trace and delete Windows Web Commander from your computer. You can remove these symptoms by using a special registration number, which will fool the rogue into believing that you have paid for its full version.

Registration number:
0W000-000B0-00T00-E0020

By all means, you should not spend a dime on this fictitious application’s licensed version, because this way you would risk your personal data and identity security to be breached by extremely devious cyber crooks. To remain protected against the cunning Windows Web Commander virus scam, make sure you ignore all type of malware detection reports and security notifications, all of which will be completely fake, and all of which serve a sole purpose of making you believe the alleged infection:

Error
Potential malware detected.
It is recommended to activate protection and perform a thorough system scan to remove the malware.

Error
Software without a digital signature detected.
Your system files are at risk. We strongly advise you to activate your protection.

Recommended:
Please click “Remove all” button to erase all infected files and protect your PC

Warning! Spambot detected!
Attention! A spambot is sending viruses from your e-mail has been detected on your PC.
Yes, protect my PC and remove spambot now (Recommended)

If you are not familiar with malware removal tasks, manual Windows Web Commander removal is not recommended for you, because you could easily delete legitimate Windows components, compromising your system even further. For this reason, using automatic removal tools would be the best idea, and your system could benefit from this option most, because it would be ensured a reliable, full-time protection against malware, which could easily attack your PC, if it is not guarded by strong software.

Download Spyware Removal Tool to Remove* Windows Web Commander
  • Quick & tested solution for Windows Web Commander removal.
  • 100% Free Scan for Windows

How to renew your internet connection:

This rogue antispyware blocks your Internet connection to prevent you from removing the rogue application. To enable the Internet connection, please follow these instructions:
  1. Open Internet Explorer and go to >Tools< select >Internet Options<

  2. Select >Connections<

  3. Select >LAN Settings<

  4. Now you need to uncheck the checkbox labeled >Use a proxy server for your LAN< in Proxy Server section. Then press the >OK< button to close this screen and press the >OK< button to close the Internet Options screen.

  5. Now you can download the SpyHunter scanner and remove the infection.

Download Spyware Removal Tool to Remove* Windows Web Commander
  • Quick & tested solution for Windows Web Commander removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Windows Web Commander

Files associated with Windows Web Commander infection:

%Desktop%\Windows Web Commander.lnk
%CommonStartMenu%\Programs\Windows Web Commander.lnk
%AppData%\1st$0l3th1s.cnf
%AppData%\result.db
%AppData%\Protector-[Random].exe
%AppData%\NPSWF32.dll

Windows Web Commander DLL's to remove:

%AppData%\NPSWF32.dll

Windows Web Commander processes to kill:

%AppData%\Protector-[Random].exe

Remove Windows Web Commander registry entries:

HKEY_CURRENT_USER\Software\ASProtect
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "UID" = "otbpxlqhjd"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alevir.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmdagent.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[1].exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfmessenger.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\protector.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srng.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tsadbot.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xp_antispyware.exe
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.