Your computer is infected with malicious software? Do you have pop-ups on your PC?
If so, search this blog for removal instructions or browse computer threats by category.

Thursday, January 15, 2015

Remove Fake Google Chrome Processes (Uninstall Guide)

Tell your friends:
If your computer started running really slow suddenly and you noticed multiple randomly named processes listed as "Google Chrome" then your computer is infected with a Trojan Horse. It might be confusing at first, because Google Chrome does create multiple instances of chrome.exe process when you open two or more tabs at once. That's just how it works. Cyber criminals know this too and try to mimic it. However, it's pretty easy to tell if a process is genuine and safe or fake and malicious. First of all, genuine Google Chrome processes and files are digitally signed and provide full version information. Secondly, Chrome doesn't create any other processes than chrome.exe except when it installs updated. If you found a running process that says "Google Chrome" in the description by the image name is Hqhnhrur.exe *32, vlvfbrxltv.exe *32 or similar then it's definitely a malicious process created by a Trojan horse. Not only these fake processes max out the CPU to 100% but can also steal your personal data and install more malware on your computer.

The term Trojan Horse probably sounds familiar, regardless of whether you're a technical genius (or a Greek scholar!) but if you're wondering exactly what one is and what effect it can have on your PC, you've come to the right place.

Trojan Horses are a particularly nasty strain of malware (contrary to popular myth, they are not actually a virus, despite often being referred to as such – viruses replicate themselves whereas Trojans do not). You should try and avoid being infected by a Trojan at all costs as they can do some real damage to your data. And yes, you did read that correctly – I said you should try and avoid them: that's because if you do have a Trojan infection, chances are, you could be to blame. Most Trojans do not create multiple processes and do not slow down computers as much as this particular fake Google Chrome virus. It's clearly less sophisticated than other Trojans in the wild right now and that's a good thing for users because they can quickly notice that something isn't right.

How does this Trojan Horse infect your computer?

The clue to how Trojan Horse malware works is in its name. And yes, you would be correct in thinking that this is something to do with the ancient Greek myth. If you remember the story from your schooldays, you'll recall how the ancient Greeks infiltrated the city of Troy by hiding their soldiers inside a specially constructed, giant wooden horse. They gave this horse to the Trojans, ostensibly as a peace offering – and once it was wheeled inside the city walls, the Greek army waited until darkness, crept out of the horse and flung open the city gates to let their fellow infantrymen inside to cause chaos. And it is this plan of attack which gives its name to our modern day Trojan Horses. They operate by fooling you into thinking they are a genuine program, convince you to install them on your computer – and then attack you from within.

Where does it come from?

You may come across a Trojan Horse in a number of different ways. Some cyber criminals use spam emails to disseminate them. Once you've opened the mail and clicked upon an attachment or file contained within, you've unleashed the malware onto your PC. Once the .exe file has run and then installed itself, the server used by the programmer will automatically launch every time you log on to your computer.

Trojan Horses can also be disguised as programs that look as if they are useful. For example, Google Chrome.

What can this Trojan Horse do and how do I protect myself?

Trojan Horses don't pull any punches when it comes to causing havoc. They corrupt your data, making it impossible to access it – and all for no reason – it's simply because they can. What a way to lose your files or documents. This particular Trojan horse that creates multiple malicious instances and Google Chrome processes doesn't corrupt files but it can install more malware on your computer and steal valuable data.

To protect yourself from this nightmare scenario you need to install a reputable anti-malware program on your PC. Also, do not open emails if you don't know who sent them – and if you do so by accident NEVER open any attachments!

To remove fake Google Chrome processes and related malware from your computer, please follow the steps in the removal guide below. If you have any questions, please leave a comment down below. Good luck and be safe online!

Written by Michael Kaur,

Fake Google Chrome Processes Removal Guide:

1. First of all, download anti-malware software and run a full system scan. It will detect and remove this infection from your computer. You may then follow the manual removal instructions below to remove the leftover traces of this malware. Hopefully you won't have to do that.

2. Download and run TDSSKiller. Press the button Start scan for the utility to start scanning.

3. Wait for the scan and disinfection process to be over. Then click Continue. Please reboot your computer after the disinfection is over.