Remove “Recommended for you” pop-up virus (Removal Guide)

“Recommended for you” is a computer virus, which will display pop-ups containing advertisements and sponsored links, with the sole purpose of generating revenue for the cyber criminals.
The “Recommended for you” pop-up ads will be appear in the bottom right corner of the browser window, either as a box containing sponsored links, or in the form of an iPhone with advertisements.

[Image: Recommended for you pop-up ads
This infection is designed specifically to make money. It generates web traffic, collects sales leads for other dubious sites, and can display advertisements and sponsored links within your web browser.

The “Recommended for you” virus is distributed through several means. Malicious websites, or legitimate websites that have been compromised, may drop this trojan onto a compromised computer. This drive-by-download often happens surreptitiously. Another method used to propagate this type of malware is spam email containing infected attachments or links to malicious websites. The threat may also be downloaded manually by tricking the user into thinking they are installing a useful piece of software.
The “Recommended for you” virus is also prevalent on peer-to-peer file sharing websites and is often packaged with pirated or illegally acquired software.

Once install on a computer, “Recommended for you” virus will modify the HOSTS file and will drop several other malicious files which will cause browse redirects to malicious websites.
Furthermore, this virus will also install a browser extension which will display advertisements pop-ups on Facebook, Amazon, Google and other websites that you are visiting.
[Image: Recommended for you virus]
These “Recommended for you” pop-ups cannot be closed because their isn’t any option to do so, and the only solution to remove this pop-ups is to click on the advertisement.
“Recommended for you” is a scam and a malicious software, we strongly recommend that you remove this trojan from your computer as soon as possible.

“Recommended for you” pop-ups – Virus Removal Guide

STEP 1:  Remove “Recommended for you” infection with Kaspersky TDSSKiller

As part of its self defense mechanism, “Recommended for you” virus will install a ZeroAccess rootkit on the infected computer.In this first step, we will run a system scan with Kaspersky TDSSKiller to remove this rookit.

  1. Please download the latest official version of Kaspersky TDSSKiller.
    KASPERSKY TDSSKILLER DOWNLOAD LINK(This link will automatically download Kaspersky TDSSKiller on your computer.)
  2. Before you can run Kaspersky TDSSKiller, you first need to rename it so that
    you can get it to run. To do this, right-click on the TDSSKiller.exe icon and select Rename.
    Edit the name of the file from TDSSKiller.exe to iexplore.exe, and then double-click on it to launch.
  3. Kaspersky TDSSKiller will now start and display the welcome screen and we will need to click on Change Parameters.
    Kaspersky TDSSKiller change settings
  4. In the new open window,we will need to enable Detect TDLFS file system, then click on OK.
    Kaspersky TDSSKiller Detect TDLFS file system
  5. Next,we will need to start a scan with Kaspersky, so you’ll need to press the Start Scan button.
    Kaspersky TDSSKiller start scan
  6. Kaspersky TDSSKiller will now scan your computer for “Recommended for you” virus.
    Kaspersky TDSSKiller scan
  7. When the scan has finished it will display a result screen stating whether or not the infection was found on your computer. If it was found it will display a screen similar to the one below.
    Kaspersky TDSSKiller results
  8. To remove the infection simply click on the Continue button and TDSSKiller will attempt to clean the infection.A reboot will be require to completely remove any infection from your system.

STEP 2: Remove “Recommended for you” malicious files with Malwarebytes Anti-Malware FREE

Malwarebytes Anti-Malware is a powerfull on-demand scanner which will remove “Recommended for you” malicious files from your computer.

  1. You can download Malwarebytes Anti-Malware Free from the below link, then double click on it to install this program.
    MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a download page in a new window from where you can download Malwarebytes Anti-Malware Free)
  2. When the installation begins, keep following the prompts in order to continue with the setup process. DO NOT make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked,then click on the Finish button.
    [Image: Malwarebytes Anti-Malware final installation screen]
  3. On the Scanner tab,select Perform quick scan and then click on the Scan button to start scanning your computer.
    [Image: Malwarebytes Anti-Malware Quick Scan]
  4. Malwarebytes’ Anti-Malware will now start scanning your computer for “Recommended for you” malicious files as shown below.
    [Image: Malwarebytes Anti-Malware scanning for
  5. When the Malwarebytes scan will be completed,click on Show Result.
    [Image: Malwarebytes Anti-Malware scan results]
  6. You will now be presented with a screen showing you the malware infections that Malwarebytes’ Anti-Malware has detected.Please note that the infections found may be different than what is shown in the image.Make sure that everything is Checked (ticked) and click on the Remove Selected button.
    [Image:Malwarebytes removing virus]
  7. After your computer restarts, open Malwarebytes Anti-Malware and perform a full system scan to verify that there are no remaining threats.

STEP 3: Remove “Recommended for you” rootkit with HitmanPro

In some cases,”Recommended for you” will also install a rootkit on victims computer.To remove this rootkit we will use HitmanPro.

  1. Download HitmanPro from the below link,then double-click on it to start this program.
    HITMANPRO DOWNLOAD LINK (This link will open a new web page from where you can download HitmanPro)
    IF you are experiencing problems while trying to start HitmanPro, you can use the Force Breach mode.To start HitmanPro in Force Breach mode, hold down the left CTRL key when you start HitmanPro and all non-essential processes are terminated, including the malware process. (How to start HitmanPro in Force Breach mode – Video)
  2. HitmanPro will start and you’ll need to follow the prompts (by clicking on the Next button) to start a system scan with this program.
    HitmanPro scanner
    HitmanPro installation
  3. HitmanPro will start scanning your computer for “Recommended for you” malicious files as seen in the image below.
    HitmanPro scan after
  4. Once the scan is complete,you’ll see a screen which will display all the infected files that this utility has detected, and you’ll need to click on Next to remove this malicious files.
    HitmanPro scan results
  5. Click Activate free license to start the free 30 days trial and remove all the malicious files from your computer.
    HitmanPro 30 days activation button

STEP 4: Reset the Windows Hosts file back to its default settings

The “Your website access has been restricted for downloading pirated software” trojan has modified your Hosts file, so that you’ll be redirected to those survey websites. To reset the Hosts file back to its default settings, we will run Microsoft Fix it 50267, however because usually the cyber criminals have changed the permissions for the HOSTS file, we will first need to revert this modification.

  1. Hosts-perm.bat is a batch file that will reset the permissions for the Windows HOSTS file.
    This infection will change the permissions on the HOSTS file so that you are unable to delete it or modify it. Hosts-perm.bat will reset these permissions so that you will once again have full access to it.
    You can download Hosts-perm.bat from the below link:
    HOSTS-PERM.BAT DOWNLOAD LINK  (This link will open a new web page from where you can download Hosts-perm.bat)
    Double-click the hosts-perm.bat file and when it is done you will see a message stating “The Permissions on the HOSTS file have been reset.”.Press any key on your keyboard to exit the batch file.
  2. Download Microsoft Fix it 50267 from the below link.
    MICROSOFT FIX IT 50267 DOWNLOAD LINK  (This link will automatically download Microsoft Fix it 50267 on your computer)
  3. Double click on MicrosoftFixit50267, then follow the prompts to reset your Windows Hosts file.
    [Image: Repair HOSTS file]

STEP 5: Remove “Recommended for you” redirects from Internet Explorer, Firefox and Google Chrome

Remove “Recommended for you” from Internet Explorer

  1. Open Internet Explorer, click on the gear icon [Image: icongear.jpg] (Tools for Windows XP users) at the top (far right), then click again on Internet Options.
    Internet Options in IE
  2. In the Internet Options dialog box, click on the Advanced tab, then click on the Reset button.
    Reset Internet Explorer
  3. In the Reset Internet Explorer settings section, check the Delete personal settings box, then click on Reset.
    Internet Explorer back to its default settings
  4. When Internet Explorer finishes resetting, click Close in the confirmation dialogue box and then click OK.
  5. Close and open Internet Explorer.

Remove “Recommended for you” from Mozilla Firefox

  1. At the top of the Firefox window, click the Firefox button, go over to the Help sub-menu (on Windows XP, click the Help menu at the top of the Firefox window), and select Troubleshooting Information.
    Firefox Troubleshooting Information
  2. Click the Reset Firefox button in the upper-right corner of the Troubleshooting Information page.
    Firefox default settings
  3. To continue, click Reset Firefox in the confirmation window that opens.
  4. Firefox will close and be reset. When it’s done, a window will list the information that was imported. Click Finish

Remove “Recommended for you” from Google Chrome

  1. Click the Chrome menu Chrome menu  button on the browser toolbar, select Tools and then click on Extensions.
    Google Chrome Extensions
  2. In the Extensions tab, remove (by clicking on the Recycle Bin button) Flash Player Update 11.0 and any other unknown or unwanted extensions.

STEP 6: Remove “Recommended for you” residual damage from your browser with AdwCleaner

  1. You can download AdwCleaner from the below link.
    ADWCLEANER DOWNLOAD LINK
     (This link will automatically download AdwCleaner on your computer)
  2. Before starting this utility, close all open programs and internet browsers.
  3. Double click on adwcleaner.exe to run the tool.
  4. Click on Delete, then confirm each time with Ok. Adwcleaner utility
  5. Your computer will be rebooted automatically. A text file will open after the restart.
  6. NEXT, double click on adwcleaner.exe to run the tool.
  7. Click on Uninstall, then confirm with yes to remove this utility from your computer.

If you are still experiencing problems while trying to remove “Recommended for you” virus from your machine, please start a new thread in our Malware Removal Assistance forum.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment