Control Commander removal guide
What is Control Commander?
Control Commander is a misleading application distributed by Internet criminals with the intention of tricking unsuspecting computer users into buying a fake antivirus program. This program is a well designed scam, and although the interface of this fake scanner has a highly professional appearance, you should not be fooled. Control Commander is designed with the sole purpose of stealing money from your credit card. You should ignore the fake scans and fake security messages generated by this bogus software.
The scan and associated messages are merely attempts to scare you into purchasing a non existent full version. If by mistake you have already bought this rogue system scanner, you should contact your credit card company to explain that you have been tricked into purchasing a fake computer program. Ignore the fake security messages and remove this bogus software from your computer as soon as possible.
Control Commander is distributed via misleading websites displaying fake security scanner pop-up messages. These fake messages report that your PC has severe security infections and that you should download Control Commander to eliminate them. These pop-ups have none of the features required to scan your computer for security errors; the reports of detected infections are false. Online security scanners such as this are used to distribute malware and they should not be trusted. To prevent these rogue programs from infiltrating your computer, use a legitimate security program with a real time scanner. If you have noticed Control Commander on your computer, you should remove it from your PC immediately.
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Malwarebytes is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
- What is Control Commander?
- STEP 1. Remove Control Commander using Safe Mode with Networking.
- STEP 2. Remove Control Commander manually by deleting files and registry entries.
Control Commander rogue removal
NOTE: Some spyware can block the downloading of spyware removers. If You cannot download the remover using the default location, try one of the alternative download locations below:
- Location 1 (the file is renamed to "iexplore.exe", since most spyware does not block this file)
- Location 2
1. Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer starting process press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, then select Safe Mode with Networking from the list.
Video showing how to start Windows in "Safe Mode with Networking":
2. Open Internet Explorer, click Tools and select Internet Options. Select "Connections".
3.Click LAN settings, if 'Use a proxy server for your LAN' is checked, uncheck it and press OK.
3. Download and install anti-spyware software to completely remove the infection.
NOTE: Some spyware can block the downloading of spyware removers. If You cannot download it using the default location, try one of the alternative download locations below:
- Location 1 (The file is renamed to "iexplore.exe" because most of spyware doesn't block this file)
- Location 2
Other tools known to remove Control Commander:
If you are unable to remove Control Commander, you can use these manual removal instructions. Use them at your own risk, since if you do not have strong computer knowledge, you could harm your operating system. Use them only if you are an experienced computer user. (Instructions on how to end processes, remove registry entries...)
End these Control Commander processes:
Remove these Control Commander registry entries:
HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWinlogon "C:Documents and Settings[UserName]Application DataCCcc.exe"
Delete these Control Commander files:
The fake antivirus programs (also known as "rogue antivirus programs" or "scareware") are applications that tries to lure computer users into paying for their non-existent full versions to remove the supposedly detected security infections (although the computer is actually clean). These bogus programs are created by cyber criminals who design them to look as legitimate antivirus software. Most commonly rogue antivirus programs infiltrate user's computer using poop-up windows or alerts which appear when users surf the Internet. These deceptive messages trick users into downloading a rogue antivirus program on their computers. Other known tactics used to spread scareware include exploit kits, infected email messages, online ad networks, drive-by downloads, or even direct calls to user's offering free support.
A computer that is infected with a fake antivirus program might also have other malware installed on it as rogue antivirus programs often are bundled with Trojans and exploit kits. Noteworthy that additional malware that infiltrates user's operating system remains on victim's computer regardless of whether a payment for a non-existent full version of a fake antivirus program is made. Here are some examples of fake security warning messages that are used in fake antivirus distribution:
Computer users who are dealing with a rogue security software shouldn't buy it's full version. By paying for a license key of a fake antivirus program users would send their money and banking information to cyber criminals. Users who have already entered their credit card number (or other sensitive information) when asked by such bogus software should inform their credit card company that they have been tricked into buying a rogue security software. Screenshot of a web page used to lure computer users into paying for a non-existent full version of control commander rogue and other rogue antivirus programs:
To protect your computer from control commander rogue and other rogue antivirus programs users should:
- Keep their operating system and all of the installed programs up-to-date.
- Use legitimate antivirus and anti-spyware programs.
- Use caution when clicking on links in social networking websites and email messages.
- Don't trust online pop-up messages which state that your computer is infected and offers you to download security software.
Symptoms indicating that your operating system is infected with a fake antivirus program:
- Intrusive security warning pop-up messages.
- Alerts asking to upgrade to a paid version of a program to remove the supposedly detected malware.
- Slow computer performance.
- Disabled Windows updates.
- Blocked Task Manager.
- Blocked Internet browsers or inability to visit legitimate antivirus vendor websites.
If you are experiencing problems while trying to remove control commander rogue from your computer, please ask for assistance in our malware removal forum.
If you have additional information on control commander rogue or it's removal please share your knowledge in the comments section below.