{"id":334,"date":"2015-05-03T11:30:39","date_gmt":"2015-05-03T16:30:39","guid":{"rendered":"http:\/\/triplescomputers.com\/blog\/?p=334"},"modified":"2015-06-26T14:01:25","modified_gmt":"2015-06-26T19:01:25","slug":"solution-malware-extensions-continually-reload-within-chrome-even-after-reinstallation","status":"publish","type":"post","link":"https:\/\/triplescomputers.com\/blog\/casestudies\/solution-malware-extensions-continually-reload-within-chrome-even-after-reinstallation\/","title":{"rendered":"SOLUTION: Malware extensions continually reload within Chrome even after reinstallation"},"content":{"rendered":"<p>Greetings again random internet-surfing technology enthusiasts,<\/p>\n<p>Today, I&#8217;d like to tackle a puzzling issue that many techs encounter with regard to disinfecting Chrome and problematic extensions that manifest within it. \u00a0Of course,\u00a0anyone with any technical expertise is aware of the fact that browser extensions are currently one of the hottest attack vectors for unsuspecting users&#8217;\u00a0machines, but removing and keeping such extensions from reloading is another matter entirely. \u00a0Some of\u00a0examples of these include:<\/p>\n<ul>\n<li>AdBlocker (<em>not\u00a0<\/em>the legitimate and excellent AdBlock)<\/li>\n<li>Vosteran Search<\/li>\n<li>WebProtector<\/li>\n<li>&#8230;<em>and many, many others<\/em><\/li>\n<\/ul>\n<p>Most techs use some degree of automatic scanning and removal tools, and that&#8217;s fine, provided they don&#8217;t rely on them exclusively (as it <em>doesn&#8217;t work<\/em>&#8230; something I&#8217;ve covered countless times in the past). \u00a0However, even those who dabble in manual or assisted-manual disinfection procedures have probably found that Chrome is one of the most problematic items to permanently clean on a user&#8217;s PC. \u00a0This is ironic because Chrome also happens to be the browser I recommend to my clients for safety and speed currently (and it has been for quite some time). \u00a0Does that mean that we should\u00a0move on to a different browser choice instead?<\/p>\n<p>Fortunately, nope. \u00a0There is indeed a pretty universal solution to this problem, and today I&#8217;ll reveal it to you. \u00a0For purposes of illustration, we&#8217;ll choose the third example extension I listed above for today&#8217;s explanation (WebProtector).<\/p>\n<p>Each Chrome extension\u00a0is affiliated with a unique identifier to help users locate and install the extension from the Chrome Web Store. \u00a0WebProtector&#8217;s, for instance, happens to be\u00a0<strong>kfecnpmgnlnbmipaogfhoacoioifjgko<\/strong>. \u00a0The Web Store does indeed host this extension in spite of its fraudulence; and Google, for all their great work in producing a relatively safe browser in Chrome, have done a pretty terrible job of keeping the store cleaned of such filth. \u00a0The problem with WebProtector (and many of these other extensions) is that even after they&#8217;re cleaned from the computer and all other malware is removed, the users may find that they reload themselves regardless later on with little or no warning. \u00a0You might think that completely uninstalling Chrome, removing all directories on the system relating to Chrome, and cleaning\/resetting the user&#8217;s Chrome Data profile (as I described in another post recently) should logically solve the problem. \u00a0But it doesn&#8217;t. \u00a0The extension yet again reloads itself upon future reinstallations.<\/p>\n<p>The answer to the puzzle is Policies in the Windows registry. \u00a0Chrome stores its policies in the following two keys:<\/p>\n<blockquote>\n<ul>\n<li>HKCU\\Software\\Policies\\Google<\/li>\n<li>HKLM\\Software\\Policies\\Google<\/li>\n<\/ul>\n<\/blockquote>\n<p>Under these keys you will find a subkey called Extensions; it is from this key that Chrome is\u00a0instructed to load the infected extensions upon each reinstallation and subsequently thereafter at regular intervals. \u00a0Simply deleting these keys (provided the user is not reliant on any policies in Chrome for administrative purposes) will prevent the behavior. \u00a0At an elevated command prompt, try typing these commands:<\/p>\n<blockquote><p>REG DELETE &#8220;HKCU\\Software\\Policies\\Google&#8221; \/f<br \/>\nREG DELETE &#8220;HKLM\\Software\\Policies\\Google&#8221; \/f<\/p><\/blockquote>\n<p>Specifically, the autoinstall keys that are likely being used are:<\/p>\n<blockquote><p>HKLM\\SOFTWARE\\Policies\\Google\\Chrome\\ExtensionInstallForceList<\/p>\n<p>HKCU\\SOFTWARE\\Policies\\Google\\Chrome\\ExtensionInstallForceList<\/p><\/blockquote>\n<p>However I like to remove the entire Policies key on most machines as other suspect keys are also often used, such as whitelisting of bad extensions and even blacklisting of good ones.<\/p>\n<p>It also goes without saying that the extension itself must first be removed for this to work. \u00a0That includes killing the keys relating to it in the following locations:<\/p>\n<blockquote>\n<ul>\n<li>HKLM\\SOFTWARE\\Google\\Chrome\\Extensions\\<\/li>\n<li>HKCU\\SOFTWARE\\Google\\Chrome\\Extensions\\<\/li>\n<\/ul>\n<\/blockquote>\n<p>As well as the\u00a0associated files within the user&#8217;s Chrome User Data directory. \u00a0If you&#8217;re really just looking to clean sweep the entire program, you can follow my previous instructions to backup the user&#8217;s Bookmarks and other personal items and then simply wipe out all related keys and files after uninstalling Chrome. \u00a0This will finally solve the problem!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Greetings again random internet-surfing technology enthusiasts, Today, I&#8217;d like to tackle a puzzling issue that many techs encounter with regard to disinfecting Chrome and problematic extensions that manifest within it. \u00a0Of course,\u00a0anyone with any technical expertise is aware of the &hellip; <a href=\"https:\/\/triplescomputers.com\/blog\/casestudies\/solution-malware-extensions-continually-reload-within-chrome-even-after-reinstallation\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[181,3,4],"tags":[],"class_list":["post-334","post","type-post","status-publish","format-standard","hentry","category-application-troubleshooting","category-casestudies","category-security"],"_links":{"self":[{"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts\/334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":0,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts\/334\/revisions"}],"wp:attachment":[{"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/media?parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/categories?post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/tags?post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}