How to remove Windows Command Processor virus

by Andy Raff on April 12, 2012

Windows Command Processor Information
Windows Command Processor Description, Symptoms and Distribution Tactics

Manual Windows Command Processor Removal Steps

Automatic Windows Command Processor Help
Windows Command Processor Remover Live Help

Windows Command Processor Removal Options and Steps


up-tp-3-hoursOption 1: MANUAL REMOVAL (Your time invested: Up to 3 Hours)*
1- Block off 1-3 hours for manual removal.
2- Have pen and paper handy to take notes.
3- Follow all 54 steps carefully to ensure full removal of the infection.

less-than-1-hourOption 2: AUTOMATIC REMOVAL (Your time invested: Around 35 min.)*
1- Download our recommended Spyhunter4 here. 100% lab tested.
2- Install and let the software scan your PC.
3- Once infection has been found, click fix threats, register, and remove.

up-to-15-mins

Option 3: EXPERTS (Estimated time invested: 15 -30 min.)*
1- Call us technicians are friendly, knowledgeable and ready to help with the removing of Windows Command Processor888.847.4130.
2- Sit back and relax while we do the work.

* Estimates are based on a PC with one infection and a DSL or equivalent internet connection.

Follow steps closely:

Step 1: Locate a safe place to jot down our Support number. This is just in case you need help on one of the steps. We are here to help you get rid of Windows Command Processor. Windows Command Processor Removal Hotline: 888.847.4130

Step 2: Completely power down the Windows Command Processor infected computer.

Step 3: Please locate the F8 button on your keyboard before turning on your computer. F8 is normally positioned on the top row of the keyboard. Be ready to tap F8 immediately on step 4.

F8

Step 4: Now turn ON the computer and tap F8 until you see WINDOWS ADVANCED OPTIONS MENU.

Step 5: The WINDOWS ADVANCED OPTIONS MENU will pop up, press down the menu using the direction keys on the keyboard and highlight SAFE MODE WITH NETWORKING. Press ENTER.

Safe

Step 6: Your PC will boot up in Safe Mode. The desktop icons and the display will appear enlarged. This is 100% normal and not caused by the infection.

Automatic Windows Command Processor Help
Windows Command Processor Remover Live Help

Step 7: It is important to check if Windows Command Processor has altered your computer’s proxy settings. Infections like Windows Command Processor can modify your default browser settings. Move to the next step to check the settings.

Step 8: Press and hold the WINDOWS KEY on your keyboard.

Windows

Step 9: While holding down the WINDOWS key now press the R key. The RUN BOX will now appear.

Windows

Step 10: In the RUN BOX, type iexplore.exe. Click OK.

Run

Step 11: The Internet Explorer browser will now launch. Along the top navigation menu select TOOLS. Within the next menu click INTERNET OPTIONS.

Tools

Step 12: Select the CONNECTIONS tab in the INTERNET OPTIONS dialog box.

Internet

Step 13: Locate the LAN SETTINGS option and click it.

Internet

Step 14: Do you see a check-mark in the box named “Use a proxy server for your LAN”, under the PROXY SERVER section? If so,, click to uncheck the box. If there is not a checkmark located in the box then you can move on to the next step.

Proxy

Need Help? Please call the Windows Command Processor Removal Hotline toll-free at 888.847.4130

Step 15: Choose the OK button to close the LOCAL AREA NETWORK box.

Step 16: To close the INTERNET OPTIONS box, click the OK button .

Step 17: We now need to run Rkill. Rkill is property of Bleepingcomputer.com. Rkill will try to disarm Windows Command Processor. Windows Command Processor is armed with the ability to block and stop any processes from running such as removal tools. We need to disarm and bypass this so we can continue with the steps. It is important to note that Rkill does not extract Windows Command Processor. It is equally important to note that should not reboot your computer after running Rkill. Windows Command Processor will simply restart if rebooted. We now need to bring up the RUN BOX. Hold down the WINDOWS key and press the R key.

Windows

Step 18: In the RUN BOX, type “iexplore.exe http://www.malwareexperts.com/rkill”. Then click OK.

Run

Step 19: The download security box with Rkill will appear, choose SAVE and select the desktop.

Run

Step 20: Once the Rkill download is complete, close out the DOWNLOAD COMPLETE box.

Step 21: Go to your DESKTOP and locate the Rkill.exe icon on your desktop.

Step 22: Double-click the Rkill icon and run Rkill.exe. Rkill will flash a black MS DOS box and attempt to paralyze Windows Command Processor.

Rkill

Step 23: Rkill will spawn a Notepad file containing information on what it found. You can close that log and go to the next step.

Step 24: Now the computer is prepared to install Malwarebytes. Malwarebytes is a very popular Malware removal application. To install Malwarebytes, we need to bring up the RUN BOX again.

Step 25: On the Keyboard press and hold the WINDOWS KEY and the R key simultaneously. The RUN BOX will appear again.

Windows

Step 26: In the RUN BOX type “iexplore http://www.malwareexperts.com/malware-remover/” and press OK.

Malwarebytes

Step 27: The download security box with Malwarebytes will appear. The options to RUN, SAVE or CANCEL will show. Select SAVE and then choose to save the file to the desktop.

Malwarebytes

Step 28: Go to your DESKTOP and locate the Malwarebytes icon on your desktop.

Step 29: Double-click the Malwarebytes icon.

Malwarebytes

Step 30: Select RUN on the Malwarebytes install box.

Malwarebytes

Step 31: After that, the SELECT SETUP LANGUAGE box will appear. Select your native language and press OK. English will be in used in the graphics example.

Malwarebytes

Step 32: The Malwarebytes SETUP WIZARD will show. Choose NEXT to continue.

Malwarebytes

Step 33: Next screen to show is the LICENSE AGREEMENT. Accept the agreement and choose NEXT.

Malwarebytes

Step 34: The BASIC INFORMATION screen is shown. Click NEXT.

Malwarebytes

Step 35: The SELECT DESTINATION LOCATION screen will appear. Choose the location you wish to have Malwarebytes install the required files. The default location shown is the normal, recommended location. Click NEXT.

Malwarebytes

Step 36: The next screen is just the SELECT START MENU FOLDER which tells the program where to place the shortcut to the application. Click NEXT.

Malwarebytes

Step 37: If you want a Desktop Icon and/or Quick Launch icon then opt-in to the corresponding check boxes on the SELECT ADDITIONAL TASKS box. Click NEXT.

Malwarebytes

Step 38: Now the READY TO INSTALL screen will show. Click INSTALL to start the installation process.

Malwarebytes

Step 39: The final screen with the pre-checked UPDATE and LAUNCH Malwarebytes will appear. Click FINISH.

Malwarebytes

Step 40: Malwarebytes will download the latest updates and show a success box. Click OK.

Step 41: The main interface of Malwarebytes with the Scanner tab will launch. Make sure PERFORM FULL SCAN is selected.

Malwarebytes

Step 42: Next step is to launch the full scan. Click SCAN to start the scan.

Malwarebytes

Step 43: A box will popup with the local drives, choose the local drives to scan and click SCAN.

Malwarebytes

Step 44: The scanner will begin. Be patient as the scan is very thorough searching for all the remnants of Windows Command Processor.

Step 45: Once the scan is finished, a message box saying the scan is complete will appear. Click OK to close the box.

Step 46: After closing the box, click SHOW RESULTS.

Malwarebytes

Step 47: Once the results show, select REMOVE SELECTED to remove all the Malware found by Malwarebytes including Windows Command Processor. Malwarebytes will also delete all of the files and registry keys affiliated with Windows Command Processor and add them to the quarantine.

Malwarebytes

Step 48: Malwarebytes may need to reboot the system to complete the removal of Windows Command Processor. Please allow the PC to reboot if Malwarebytes asks for it.

Step 49: After the reboot is complete and the system is relaunched, please follow the on-screen instructions and continue the removal process.

Step 50: A Notepad log will be created by Malwarebytes. Close the log once reviewed.

Malwarebytes

Step 51: Once Malwarebytes has completed the removal process and has removed all the traces of Windows Command Processor, your computer should be 100% clean from Windows Command Processor.

Step 52: If Windows Command Processor is not removed and you are still having issues. Please call the Windows Command Processor Removal Hotline toll-free at 888.847.4130

Infection

PLEASE “LIKE US” ON FACEBOOK!

Did we help you remove Windows Command Processor?
If so, please leave a comment and like us.
Like us on Facebook


Windows Command Processor Description

A brand new infection is spreading on the internet named Windows Command Processor. Under our site staff categorization, Windows Command Processor falls under the fake security programs category. Remove this infection before it causes additional system problems. Windows Command Processor will automatically install itself on a computer without user consent.

Windows Command Processor Signs and Symptoms

After installation, a fake scan is presented by Windows Command Processor. A barrage of make-believe error and security messages are also launched by Windows Command Processor. A fake results screen following the scan only appears to try to lure you into buying the program. Connect with your credit card representative soon if you got a copy of the infection and purchased it.

Windows Command Processor Distribution

Tough to say exactly how Windows Command Processor got on your computer. Using a bogus scanner page is a frequent way Windows Command Processor gets onto machines. The scanner masquerades as a legit window. Another possibility of how Windows Command Processor arrives is via a Trojan designed to look like a flash update or video codec. If left alone, Windows Command Processor can continue to damage operating systems and should be removed immediately.

Back to Top

Automatic Windows Command Processor Help
Windows Command Processor Remover Live Help

About the author

Starbucks Junkie, Malware Fighter. Find me via Contact Form on this site or on my Google+ page.

Previous post:

Next post: