Clean Up Google Chrome from Pop-ups, Redirects, Ads (June 2017) - How to, Technology and PC Security Forum | SensorsTechForum.com
THREAT REMOVAL

Clean Up Google Chrome from Pop-ups, Redirects, Ads (June 2017)

This post is created to help you clean your Google Chrome web browser from malicious browser extensions and other software that may poison it with various forms of ads or redirects.

Even though ransomware has seen the spotlight among malicious applications, adware developers have also not been sleeping. In fact the adware programs in 2017 are more sophisticated than ever and can be very difficult to be removed, especially from web browsers. They use malicious files and scripts taken from actual malware in order to remain persistent on your computer, even after you have removed an ad-supported application. This is why we have decided to create the following instructions which aim to help you clean up your computer completely. They are combined instructions from Google Support and some other help and support forums and all In combination make for the complete removal of any app that may be an obstacle to your computer and Google Chrome browser. Let’s begin!

How to Clean-Up Google Chrome Manually

Removing Unwanted Apps from Chrome in Windows

If you are using Google Chrome browser on Windows, you need to download a tool, called Chrome Cleanup Tool. It can be downloaded by clicking on the following web link.

1) Click on Accept and Download to download the tool and then click on the Run button to run it as an administrator:

2) After the tool is opened a scan should be ran in order to establish if there are any suspicious programs on Google Chrome. If so, the tool will clean the browser up, without you having to reinstall it and loose all your saved logins and other data.

Resetting Your Google Chrome Settings

Since the clean-up tool will finally redirect you to reset Google Chrome, there are few things that you should do first.

Before restarting Google Chrome browser to it’s stock state, it is very important that you backup all your saved logins and passwords in case you experience the issue of losing them which can cause you a lot of headaches. You can find your login passwords at Settings>Passwords and forms> Manage passwords (highlighted text in blue).

After having done the backup of your passwords you can reset Google Chrome to the state it was when you initially installed the web browser. This is achievable by following the steps below:

1) Open the More menu on your top right. (Three vertically arranged dots).
2) Click on Settings to open the options menu.
3) The the bottom of the options, click on the Show advanced settings highlighted text.
4) At the bottom again, you will find a header, called “Reset Settings”. On it, click on the Reset settings and then confirm it, by clicking on the “Reset” button.

How to Remove All Files and Objects Related to Adware on Your PC

Even though you may have cleaned up Google Chrome successfully, there are multiple objects which the app leaves behind. Those files or entries may reinstall the app, even after you have cleaned up your computer. Their usual locations are:

  • The Windows Registry Editor.
  • %AppData%
  • %Windows%
  • %System%
  • %System32%
  • %Temp%
  • %Local%
  • %LocalLow%

This is why, for complete removal, we strongly suggest you to use the removal steps below in order to remove the suspicious ad-supported programs permanently.

1.Fix registry entries created by ads and unwanted software on your PC

Fix registry entries created by ads and unwanted software on your PC.

Some malicious scripts may modify the registry entries of your computer to change different settings. This is why manual clean up of your Windows Registry Database is strongly recommended. Since the tutorial on how to do this is a bit lenghty, we recommend following our instructive article about fixing registry entries.

2. Remove ads and unwanted software with SpyHunter Anti-Malware Tool

Remove ads and unwanted software with SpyHunter Anti-Malware Tool

1. Install SpyHunter to scan for and remove ads and unwanted software.2. Scan with SpyHunter to Detect and Remove ads and unwanted software.
Step 1: Click here to go to SpyHunter’s download instruction page.
Step 2: Guide yourself by the download instructions provided for each browser.
Step 3: After you have installed SpyHunter, wait for it to automatically update.

pets-by-myway-ads-virus

Step1: After the update process has finished, click on the ‘Scan Computer Now’ button.
pets-by-myway-ads-virus
Step2: After SpyHunter has finished scanning your PC for any ads and unwanted software files, click on the ‘Fix Threats’ button to remove them automatically and permanently.
pets-by-myway-ads-virus
Step3: Once the intrusions on your PC have been removed, it is highly recommended to restart it.

3. Back up your data to secure it against attacks related to ads and unwanted software in the future

Back up your data to secure it against attacks in the future

IMPORTANT! Before reading the Windows backup instructions, we highly recommend to back up your data automatically with cloud backup and insure it against any type of data loss on your device, even the most severe. We recommend reading more about and downloading SOS Online Backup .

1. For Windows 7 and earlier 1. For Windows 8, 8.1 and 10 1. Enabling the Windows Defense Feature (Previous Versions)

1-Click on Windows Start Menu
backup-1
2-Type Backup And Restore
3-Open it and click on Set Up Backup
w7-backup3
4-A window will appear asking you where to set up backup. You should have a flash drive or an external hard drive. Mark it by clicking on it with your mouse then click on Next.
backup-3
5-On the next window, the system will ask you what do you want to backup. Choose the ‘Let Me Choose’ option and then click on Next.
backup-4
6-Click on ‘Save settings and run backup’ on the next window in order to protect your files from possible attacks by ads and unwanted software.
backup-5

1-Press Windows button + R
filehistory-1
2-In the window type ‘filehistory’ and press Enter
filehistory-2
3-A File History window will appear. Click on ‘Configure file history settings’
filehistory-3
4-The configuration menu for File History will appear. Click on ‘Turn On’. After its on, click on Select Drive in order to select the backup drive. It is recommended to choose an external HDD, SSD or a USB stick whose memory capacity is corresponding to the size of the files you want to backup.
filehistory-4
5-Select the drive then click on ‘Ok’ in order to set up file backup and protect yourself from ads and unwanted software.

1- Press Windows button + R keys.
sysdm
2- A run windows should appear. In it type ‘sysdm.cpl’ and then click on Run.
windows-defense2
3- A System Properties windows should appear. In it choose System Protection.
windows-defense3
5- Click on Turn on system protection and select the size on the hard disk you want to utilize for system protection.
6- Click on Ok and you should see an indication in Protection settings that the protection from ads and unwanted software is on.
windows-defense1
Restoring a file via Windows Defense feature:
1-Right-click on the encrypted file, then choose Properties.
file-restore1
2-Click on the Previous Versions tab and then mark the last version of the file.
file-restore2
3-Click on Apply and Ok and the file encrypted by ads and unwanted software should be restored.

How to Protect Yourself in the Future

Cyber-crooks have become very smart in both developing viruses as well as methods of infection of users. Both home users and enterprises should beware and always apply the following advises to the PCs in their networks:

  • Make sure to use additional firewall protection. Downloading a second firewall (like ZoneAlarm, for example) is an excellent solution for any potential intrusions.
  • Make sure that your programs have less administrative power over what they read and write on your computer. Make them prompt you admin access before starting.
  • Use stronger passwords. Stronger passwords (preferably ones that are not words) are harder to crack by several methods, including brute forcing since it includes pass lists with relevant words.
  • Turn off AutoPlay. This protects your computer from malicious executable files on USB sticks or other external memory carriers that are immediately inserted into it.
  • Disable File Sharing – it is recommended if you need file sharing between your computer to password protect it to restrict the threat only to yourself if infected.
  • Switch off any remote services – this can be devastating for business networks since it can cause a lot of damage on a massive scale.
  • If you see a service or a process that is external and not Windows critical and is being exploited by hackers (Like Flash Player) disable it until there is an update that fixes the exploit.
  • Make sure always to update the critical security patches for your software and OS.
  • Configure your mail server to block out and delete suspicious file attachment containing emails.
  • If you have a compromised computer in your network, make sure to isolate immediately it by powering it off and disconnecting it by hand from the network.
  • Make sure to educate all of the users on the network never to open suspicious file attachments, show them examples.
  • Employ a virus-scanning extension in your browser that will scan all the downloaded files on your computer.
  • Turn off any non-needed wireless services, like Infrared ports or Bluetooth – hackers love to use them to exploit devices. In case you use Bluetooth, make sure that you monitor all of the unauthorized devices that prompt you to pair with them and decline and investigate any suspicious ones.
  • Employ a virus-scanning extension in your browser that will scan all the downloaded files on your computer.
  • Employ a powerful anti-malware solution to protect yourself from any future threats automatically.
Avatar

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...