Remove Cpokotex.com (Chrome/Android)


How irritating is this problem? (1 votes, average: 5.00)
Loading...

This page aims to help you remove Cpokotex.com. Our removal instructions work for Chrome, Firefox and IE, as well as every version of Win and Android.

What is the most likely reason behind all those unpleasant advertisements that have recently started nagging you while you are trying to browser the Internet? Well, in most cases, online ads are generated by the sites that users tend to visit. It’s the site developers’ way of earning money from their sites without requiring payment from the sites’ visitors. However, not all web ads are site-generated. There’s a special type of online advertisements that come from a software component within the user’s browser. In most cases, such software components are referred to as adware or browser hijackers. The difference between these two is that, aside from spamming you with different ads, banners, page-redirects and box messages, a hijacker would also likely tinker with the search engine tool or with the homepage settings of your browser (Chrome, Firefox, Opera or pretty much any other browser out there could get affected by that!).

Here, we will be specifically focusing on the Cpokotex.com app which seems to possess a number of traits typical for a representative of the browser hijacker category. Cpokotex.com, just like most other browser hijackers can attach itself to your browser without even notifying you about it or asking for your permission in a clear and open way. Note that in most cases, it’s the user that actually allows such software to get installed on their PCs and, respectively, on their browsers but in the majority of instances, this happens through some kind of stealth installation (we will tell you more about that later, in this article). Regardless of how the hijacker got to the PC, however, one thing should be obvious – the pesky app needs to be removed for the intrusiveness to stop. You really can’t hope that Cpokotex.com would cease to spam your screen with random ads or page redirects and that it will allow you to bring your browser settings back to the way they were before the hijacker got installed on your machine. Hijackers tend to be really intrusive and invasive which is why the best way to really ensure that they are no longer affecting your browser is to have them fully uninstalled. Since, however, this might not always be so easy, we have prepared a removal guide for Cpokotex.com down below:

Remove Cpokotex.com

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Step1

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab (the “Details” Tab on Win 8 and 10). Try to determine which processes are dangerous. 

malware-start-taskbar

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/




Scan Results


Virus Scanner Result
ClamAV
AVG AV
Maldet


After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

Step3

Hold together the Start Key and R. Type appwiz.cpl –> OK.

appwiz

You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

Type msconfig in the search field and hit enter. A window will pop-up:

msconfig_opt

Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

Step4

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.

  1. Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click  Properties.
  2. The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
  3. Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.

DNS

Step5

  • After you complete this step, the threat will be gone from your browsers. Finish the next step as well or it may reappear on a system reboot.

Right click on the browser’s shortcut —> Properties.

NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).

browser-hijacker-taskbar-properties

Properties —–> Shortcut. In Target, remove everything after .exe.

ie9-10_512x512  Remove Cpokotex.com from Internet Explorer:

Open IE, click  IE GEAR —–> Manage Add-ons.

pic 3

Find the threat —> Disable. Go to IE GEAR —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

firefox-512 Remove Cpokotex.com from Firefox:

Open Firefoxclick  mozilla menu  ——-> Add-ons —-> Extensions.

pic 6

Find the adware/malware —> Remove.
chrome-logo-transparent-backgroundRemove Cpokotex.com from Chrome:

Close Chrome. Navigate to:

 C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

Rename the Folder to Backup Default

Rename it to Backup Default. Restart Chrome.

Step6

Type Regedit in the windows search field and press Enter.

Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

Since hijacker developers earn significant amounts of money from the advertising-oriented software that they create and since most users don’t really want any hijackers on their computers due to the intrusiveness of the ads of the changes to the browser, most software components like Cpokotex.com tend to be rather tricky to remove. A build-in uninstallation feature such as an uninstallation .exe file is something you can’t really expect for a hijacker app to have. Remember, the longer this software remains on your computer, the greater the potential profit from it would be for its developer which is why hijackers are programmed to be as difficult to remove as possible (without crossing any legal threshold). One thing to note here is that hijackers, though intrusive, invasive and difficult to remove, are not actually viruses and can’t mess with your system or with the files on your computer in the same way that a Trojan Horse infection or a Ransomware virus could. The purpose behind hijackers isn’t malicious by itself and the way these apps achieve their goal isn’t really illegal. This actually makes it rather easy for hijacker developers to distribute their products without having them flagged as illegal malware. This is also the reason why a lot of the antivirus programs out there might not actually regard Cpokotex.com as a hazardous or unwanted app and why they might not notify you about its presence on your PC (or offer you to have the hijacker removed). However, this is where our guide should come in particularly handy as it will allow you to easily and effectively eliminate the undesirable app.

Regarding browser hijacker distribution methods

As we already said, most of the time, it’s the users who, albeit unknowingly, allow browser hijackers to get installed and attached to their browsers. Usually, this happens when the user decides to install some new program that has a hijacker bundled with its installation manager. Typically, any bundled software components would be enabled by default and it’s the user’s job to manually leave the ones that the might not want out of the installation. However, to do that, you would normally need to access the Advanced or the Custom setup menu where you will be given more customization settings with regards to the installation configuration. Always make sure to check those menus and manually uncheck anything that looks like it might be unwelcome on your PC.

SUMMARY:

Name Cpokotex.com
Type Browser Hijacker
Danger Level Medium (nowhere near threats like Ransomware, but still a security risk)
Symptoms  Hijackers usually get noticed after they start tinkering with the browser settings and displaying their nagging ads.
Distribution Method Most of the time, such apps get distributed via installation bundles.
Detection Tool

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


Leave a Comment