How to stop pop-ups is an advertising tool, belonging to the adware set. The word reflects that’s only target is to distribute lots of unwanted banners on all websites, without regard to customer's comfort and requests. Except for that, it means that in case you allow such a program into the system, you'll, in short, struggle to erase it. It needs much more efforts and time to eliminate an advertising utility than to escape it, and in our item, we will tell you how to keep the PC safe forever. On top of that, we'll explain to you how to get rid of the unwanted tools that managed to get into your OS.

What is

Youtubemp4 virus is a suspicious program, which we have just said. Like all other kinds of hazardous utilities, adware has its ordinary patterns of action and sticks to them right along. They are not accidental, each’s action triggers the following one, and if you know where to look – you might locate an advertising program right away. We’ll discuss it in the next section, but in this one we'll find out how a user may define a suspicious utility before downloading it.


Dangerous utilities can’t be fair with their victims and just declare their intentions. It might drop the penetration chances by far if’s description actually reflected the things it is able to do to customer's system and the amount of efforts it needs to delete it. “This software is ready to drown you in pop-ups, covering websites’ content and making you sick of the advertising industry in its entirety.” We think that this is not happening, so in case you look for a program to install – inspect it thoroughly to escape viral infection. Adware frequently uses disguises of other sorts of software. Here are the examples:

  • System cleaning utilities. These are the slick ones. System optimizers are supposed to perform the operations you may execute in manual way, but simply don’t wanna waste your time on them. Clearing waste of incorrectly uninstalled tools, invalid icons, useless empty folders, cache, etc. Of course, web-criminals found out how many PC operators don't ever perform those actions, and can't realize if their system optimizer is really working or not. It called an abundance of useless tools, which show feverish practice and dummy indications, yet their sole task is to show ads.
  • Browser add-ons. Their claimed purposes vary from accelerating victim's browser to granting access to super-tasty offers in any niche. You can be sure, that every popular browser already has everything you need to utilize it successfully. Of course, there are lots of real browser apps, yet they’re well-known, and you can easily see if one of them suits your needs.
  • Programs that help to “unlock” web pages, which means that a customer can attend a website from a territory where it's prohibited. These programs are also known as VPN, and they are very serviceable, and the very useful ones are known by hundreds of thousands of people. If you're looking for an effective VPN – install a well-known one.

How works


We have already told, dangerous software has an algorithm, and closely follows it from top to bottom. The basic piece you shouldn't forget is that unwanted utilities aren't distributed in single file. Usually, they do it in parties. An adware bundle means a package, comprising a few programs, and only one of them is useful. Suchlike bundles could be downloaded from all file-sharing sites around the Internet. That’s why we keep telling customers that they should get utilities exclusively from well-known web pages: you won’t get any viruses, installing a program from a trusted website that looks after its reputation.

As an installation file is uploaded somewhere for gratis access, and a user downloads it, the infection phase begins. The bundle can't be inspected until you begin the installation, and in case you do – it strongly suggests you to choose an "easy" way. It equals to allowing all those programs onto the computer. The majority customers don’t even care about a dialogue window, and mindlessly allow and several other malicious utilities onto the laptop. To get rid of on this stage, you must read every single bit of information that pops up in the windows while you're installing any software.

The terminal phase is to make a victim’s computer ready for adware's tasks. modifies the controls of the browser, changes the homepage address, and writes in additional values to a registry to obstruct you from eliminating in case you attempt to. These actions result in an overwhelming amount of ads on all sites and, in a while, the weakened browser cannot prevent other attacks, and the system will be fully clogged with malicious software. If you don’t like that – you need to uninstall as soon as possible.

How to remove

Method 1. Use special removal software

Method 2. Remove manually

Step 1. Uninstall the unfamiliar programs from Control Panel

Step 2. Check hosts file

Step 3. Remove from the browser (Google Chrome/Mozilla Firefox/IE/Opera/Safari/Edge)


If you are MAC user, follow this guide How to remove virus from MAC


You'd better remember that even as isn't very perilous, it deals injury little by little, thus the longer you think about it, the more time it will need to uninstall it. We're aware of two completely safe and trusty manners to eliminate from the system: manual and automatic. The manual mode is highly preferable for those who have some computer literacy, and whose computers aren’t completely taken over by unwanted programs. The automatic method is less complex and can deal with all types of infection and needs no practice of any sort but, as you might have supposed, requires downloading a decent antivirus. To deal with deletion, we’ll suggest you to install Spyhunter, a useful program, which is developing for ten years already. Spyhunter has thousands of happy customers in multiple countries, and if you want to be a part of this family – click the button under this paragraph. removal tool

Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

Instructions for manual deletion

Step 1. Uninstall software from the system

Windows 7

1. Uninstall the unfamiliar programs from Control Panel

  • Start
  • Control Panel
  • Programs
  • Programs and Features
  • Uninstall a program
  • Select a program and press Uninstall

2. Check the following folders for the suspicious elements

  • C:\Program Files\
  • C:\ProgramData\
  • C:\Users\YOUR_USER\AppData\Roaming\
  • C:\Users\YOUR_USER\AppData\Local\

3. Clean registry:

  • Click Start
  • Type Regedit.exe
  • Search for "" and delete these elements


Windows 10

1. On the field Search Windows type 'Control Panel'

2. Click Uninstall a program

3. Select the program and press Uninstall



Windows 8

1. Point to the upper-right corner of the screen, move the mouse pointer down, and tap Search.

2. Enter control panel in the search box, and then click Control Panel.

3. Under View by:, select Large Icons, and then click Programs and features.

4. Click the program, and then click Uninstall.

5. Follow the instructions on the screen.

6. Delete unfamiliar programs from Control Panel

  • Start
  • Control Panel
  • Programs
  • Programs and Features
  • Uninstall a program
  • Select a program and press Uninstall

7. Remove elements like on Win7.


Step 2. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 3. Disable notifications in the browser

Google Chrome

  • Launch Google Chrome
  • Customize and Control Google Chrome
  • Settings
  • Advanced
  • Content settings
  • Notifications
  • Block all specific pages


Mozilla Firefox

  • Launch Mozilla Firefox
  • Open menu
  • Options
  • Privacy and Security
  • Notifications
  • Settings...
  • Remove suspicious websites


Opera browser

  • Open Opera browser;
  • Customize and Control Opera;
  • Settings;
  • Advanced
  • Content settings
  • Notifications
  • Block all specific pages



Step 1. Start Safari browser

Step 2. Display a menu of General Safari Settings

Step 3. Reset Safari...

Step 4. Press "Reset"

Microsoft Edge

Step 1. Delete the suspicious extensions.

  • Menu
  • Extensions
  • Choose unfamiliar extension
  • Press Uninstall

Step 2. Change homepage.

  • Go to the website of the search engine you want
  • Select More actions
  • Settings
  • View advanced settings
  • Change search engine
  • Select search engine you want and Set as default


Video how to reset browser and remove all extensions


This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.