Adware is the term used for intrusive advertisements that have been injected into your computer without your permission.

While there is some attempt to refer to adware as advertising-supported software, this only comes from the developers of the malware themselves. Since adware is abusing you and your computer by being installed without your consent, it can only ever be referred to as malware by those who understand its true workings.

The adware that is restricted to the browser can often be removed manually by getting access to the browser’s extensions page or by resetting the browser. There are several software packages you can install which are designed to remove any adware that keeps coming back regardless of what you do to the browser. At the top of that list is AdwCleaner-–an adware cleaning tool that we have been using for decades now. It has always been trustworthy but it surely is now that it has been acquired by Malwarebytes, a leading malware-fighting software tool. But you can also use alternative tools such as SpyBot Search & Destroy. Any tool you trust is fine.

EXAMPLE: The Rocket Arcade Adware

The Rocket Arcade Adware

Tips to Avoid Malware in the Future

If you have malware on your computer, you can always install an antimalware program and run a scan to try to remove it. But some experts suggest that even if you do that, it is not a given that all malware can be removed—once it gets access to your system, some of its associated files may prove close to impossible to extract.

So naturally, that means you should try preventing the malware from getting on your computer in the first place.

Here are some of the most common ways you can avoid getting malware on your PCs:

  • Be cautious when downloading. You can anticipate finding malware on some websites more than others. If you are using a reliable web browser, it should already provide timely protection by alerting you to sites littered with threats upon visiting them—do not ignore those warnings. What’s more, try not to visit any websites that you think maybe untrustworthy: Torrenting sites may offer handy legal files, and the founders are not necessarily evil, but you need to remember that random people around the world are uploading each of those files, including the directories of such sites riddled with illegal movie files. A notorious niche for malware is sites hosting or sharing torrents for this reason—not everyone is interested in helping you download free files without getting something in return. Often that return comes in the form of malware tucked away within the files you download, tricking you into thinking that they are only movies.
  • Install (full paid versions of) third-party antimalware programs if you can. If your operating system is not providing adequate protection from malware threats, you ought to look into third-party programs. They will not always protect you in real-time for free, but the paid versions often do. That means if the program detects the file you are about to download is malware, it lets you know about it with a warning. At this stage, Microsoft Windows does not automatically block potentially unwanted programs, so third-party protection for malware may still be sensible to use.
  • Keep all data and personal information safe. The malware only becomes a problem when it nestles its way into your operating system, and in the precise location that its developer had set out for it. Simply being on your computer is not necessarily a cause for concern for your computer; it is what it does from that position that dictates your computer’s outcome. Moreover, not all malware is trying to cause computer problems; sometimes it wants to snoop on your data instead. To keep prying malware at bay, look into ways of keeping your data safe, such as using file encryption. Windows 10 comes with EFS for encrypting individual files and also BitLocker encryption for the full disk.
  • Keep your software up to date. It does not matter what software you have that makes up one of your computer programs; if it is outdated, then it may also be insecure. Simply being outdated software does not necessarily open up new avenues for vulnerabilities. Rather, new updates potentially close old vulnerabilities. It can be said with certainty that your software is safe to continue using if you know there are no vulnerabilities. However, if antivirus or PC manufacturers find vulnerabilities, updates are critical. If you do not want to follow the news every day, it is best to keep updating and know that you are safe. That means ensuring your operating systems are updated with their regular over-the-air software update rollouts. For Windows users, this means keeping the Windows Update automatic updates enabled, so the automatic updates can arrive when Microsoft has them prepared for your machine. Additionally, only uninstall a Windows update if you know your PC has an issue with its current software version.
  • Keep networks secure. All your computers (desktops, laptops, smartphones), and other peripherals such as printers, when connected to WiFi, are often connected to the same network. Ensure a secure network with a password. Otherwise, your WiFi connection will be open. The best security today is with WPA or WPA2 encryption. You typically do not have much to worry about here, as all competitive WiFi providers automatically implement it. But make sure it stays that way after you begin using it by not disabling the encryption. 
  • Do not use open WiFi. You have heard the warning: Stay away from that open WiFi you get at airports, unless you need it. The idea behind this warning is because the connection is considered public that it also means people with malicious intent have easy access to it. Thus, the information on your smartphones, tablets, and laptops cannot be properly protected with open WiFi connections.

The following tutorial demonstrates how to remove the The Rocket Arcade malware from your computer.

Contents of This Tutorial

For Windows

For Windows, Mac, Android, and iOS

Method One: How to Remove The Rocket Arcade Adware by Resetting Browser to Default Settings and Cleaning Up Browser

If you see some of these problems, you might have malware installed on your computer. If the malware is secluded to the browser, you should be able to remove it by resetting the browser’s settings.

  • Pop-up ads continuously interrupting your web browsing experience
  • New browser tabs loading websites which differentiate from your defaults selected
  • Unwanted web browser extensions and toolbars keep coming back
  • The web browser redirects to webpages or ads that you did not request
  • Fake alerts regarding a virus or an infected device

You can avoid this unwanted software in the future by only downloading files from secure sites.

1. Do step 2, step 3, or step 4 depending on what it is that you would like to do.

2. To Reset Google Chrome

Here is how you can reset the browser settings from the Settings and more menu in Google Chrome:

a. Click on the Settings and more (Alt+F) three-dotted menu icon, and then click on the Settings link from the menu. (Click to enlarge the screenshot below.)

Google Chrome: Settings

b. Scroll down and then click on Advanced at the bottom of the page. (Click to enlarge the screenshot below.)

Google Chrome: Advanced settings

c. Under the Reset and clean up heading, click on the Restore settings to their original defaults link. (Click to enlarge the screenshot below.)

Google Chrome: Restore settings to their original defaults

d. From the Reset settings overlay, click on the Reset settings button. (Click to enlarge the screenshot below.)

Google Chrome: Reset settings dialog

e. Under the Reset and clean up heading once again, click on the Clean up computer link. (Click to enlarge the screenshot below.)

Google Chrome: Clean up computer

f. Next to where it says Find and remove harmful software, click on the Find button. (Click to enlarge the screenshot below.)

Google Chrome: Find harmful software

You can now close the Google Chrome web browser and continue using your computer if you like.

3. To Reset Mozilla Firefox

Here is how you can reset the browser settings from the Settings and more menu in Firefox:

a. Click on the Settings and more three-lined menu icon, and then click on the Help link. (Click to enlarge the screenshot below.)

Mozilla Firefox: Help

b. Click on the Troubleshooting Information link. (Click to enlarge the screenshot below.)

Mozilla Firefox: Troubleshooting information

c. Click on the Refresh Firefox button. (Click to enlarge the screenshot below.)

Mozilla Firefox: Reset Firefox

d. Click on the Refresh Firefox button when you get the confirmation dialog box.

Refresh Firefox dialog

You can now close the Mozilla Firefox browser and continue using your computer if you like.

4. To Reset Microsoft Edge

Here is how you can reset the browser settings from the Settings and more menu in Microsoft Edge:

Notes:

  • As of January 2020, the new Chromium-powered Microsoft Edge browser has been made generally available, and it comes with a built-in Potentially Unwanted Program (PUP) blocker. It will not have helped you in preventing any malware yet because Microsoft has the Potentially Unwanted Program blocker turned off by default. The reason for this is because it’s still debated whether a PUP is indeed malware since some PUPs can prove useful to some people, hence the term “potentially” in Potentially Unwanted Program.
  • In times past, you would have had to reset the Microsoft Edge browser from the Settings application in Windows 10. That did not make much sense if Microsoft wanted people who use other operating systems to use their web browser. And since alternative operating systems are gaining additional market share, it meant that many Mac users, in particular, could not reset Edge. In the updated Chromium-powered version of Edge, Microsoft has made a change so you can now reset the browser from its settings, similar to what you would find with Google Chrome. They have also removed the option to reset the browser from the Settings app.

a. Click on the Settings and more (Alt+F) three-dotted menu icon, and then click on the Settings link from the menu. (Click to enlarge the screenshot below.)

Microsoft Edge: Settings

b. From the Settings menu, click on the Reset Settings link. (Click to enlarge the screenshot below.)

Note: You only see the left Settings menu that you need is you have expanded the browser window so that it is large enough to show up.

c. Under the Reset settings heading, click on the Restore settings to their default values link. (Click to enlarge the screenshot below.)

Microsoft Edge: Restore settings to their default values

d. From the Reset settings overlay, click on the Reset button. (Click to enlarge the screenshot below.)

Microsoft Edge: Reset settings dialog

You can now close the Microsoft Edge browser and continue using your computer if you like.

While resetting and cleaning up your web browser may remove the malware from the browser directly, it is possible, depending on the malware, that there are still associated malicious files leftover on the Windows operating system. These leftover files can cause malware to change the browser’s settings again. If you need to take further action because you suspect malware is continuing to change your browser’s settings, you ought to continue with another method below that either removes the malware via a built-in antivirus like Microsoft Defender or a third-party antimalware program.

Method Two: How to Remove The Rocket Arcade Adware Using Microsoft Defender in Windows 10

Windows 10’s default antivirus program, Microsoft Defender, (known as Windows Defender before the Windows 10 November 2019 Update) doubles as very good antivirus and antimalware protection. The term “antimalware” is a more modern version of the term “antivirus” because a multitude of malicious programs exist today rather than computer viruses alone. Microsoft Defender finds all sorts of malware and is antimalware that keeps the traditional antivirus name to avoid confusion. That said, Microsoft Defender still might not remove a Potentially Unwanted Program (PUP) on your computer until you enable the PUP protection first. If you tried an antivirus/antimalware scan with Microsoft Defender and the malware was not found, you can try enabling the PUP protection and try again before installing third-party software on your computer.

See also: How to Use Malicious Software Removal Tool in Windows 10

Note: The terms “Potentially Unwanted Programs” (PUPs) and “Potentially Unwanted Applications” (PUAs) are interchangeable. When referring to misleading software installed as a bundle or without users’ consent, common antimalware programs use the term “PUP;” however, Microsoft prefers “PUA” in Windows 10.

The Windows Security app currently has seven areas that work together to keep your computers protected from harmful threats. They are as follows:

  • Virus & Threat Protection. It is where you can run scans, view the threat history, set up ransomware protection, and access other settings and notifications such as the Controlled folder access that comes with Microsoft Defender Exploit Guard and sign-in to Microsoft OneDrive.
  • Account Protection. It helps users protect their identity when they sign in to Windows with the new Account Protection pillar in the Microsoft Security app. Account Protection offers some additional chances to secure an account outside of the traditional password, including Windows Hello facial and fingerprint recognition of a PIN for faster sign in.
  • Firewall & Network Protection. It manages the Microsoft Defender firewall settings and allows you to monitor networks and internet connections.
  • App & Browser Control. It shows Microsoft Defender SmartScreen settings and exploit protection mitigations.
  • Device Security. It gives greater insight and access to device security settings.
  • Device Performance & Health. It shows drivers, storage space, and other issues with Windows Update, plus keeps the device clean and up to date by installing the latest version of Windows 10.
  • Family Options. It offers parental controls and tips to manage your children’s online experience and how to keep kids safe online.

Note: Windows 10 allows you to create system restore points, perform a system restore, change the system restore point creation frequency, and delete system restore points. This collection of tutorials details everything you need for creating, performing, and managing restore points. A restore point is a Windows recovery option that lets you load the operating system at a previous time, which is helpful for when you are stuck due to unsuccessful troubleshooting attempts. Windows’ System Restore is not always turned on by default in Windows 10, so if you haven’t heard of the feature before today, you may not have any restore points created that can help you.

Part One: How to Enable or Disable Microsoft Defender PUA Protection in Windows 10

When removing Potentially Unwanted Programs from your computer with the default Microsoft Defender antivirus, you should enable PUP protection first. Here is how to do that:

Option One: How to Enable or Disable Microsoft Defender PUP Protection in Windows PowerShell

1. Open an elevated Windows PowerShell. See this tutorial to read all the different ways in which you can open the elevated version of the Windows PowerShell: How to Open Elevated Windows PowerShell in Windows 10

2. If you are prompted by User Account Control, click on the Yes button.

3. Type one of the following commands into the Windows PowerShell window, depending on what you want to achieve, and then press the Enter key on your keyboard to execute it:

To Enable Microsoft Defender PUA Protection:
Set-MpPreference -PUAProtection 1
or
Set-MpPreference -PUAProtection Enabled

To Disable Microsoft Defender PUA Protection (Default):
Set-MpPreference -PUAProtection 0
or
Set-MpPreference -PUAProtection Disabled

Audit Mode – detects PUPs, but does not block them:
Set-MpPreference -PUAProtection 2
or
Set-MpPreference -PUAProtection AuditMode

4. Restart the computer before attempting to run a new Microsoft Defender antivirus scan that searched for extra PUPs.

You can now close the Windows PowerShell window and continue using your computer if you like.

Option Two: How to Enable or Disable Microsoft Defender PUA Protection in Local Group Policy Editor

Notes:

  • You can only use this option from the Local Group Policy Editor starting from Windows 10 version 1809.
  • The Local Group Policy Editor is only available in Pro, Enterprise, and Education editions of Windows 10.
  • Though Microsoft changed the name Windows Defender to Microsoft Defender in Windows 10 version 1909, as of yet, the Local Group Policy Editor has not been updated to reflect this change. Should there come a time when the following path no longer works, try exchanging Windows Defender for Microsoft Defender in the Local Group Policy Editor where applicable.

1. Open the Local Group Policy Editor (gpedit.msc). See this tutorial to read all the different ways in which you can open the Local Group Policy Editor: How to Open Local Group Policy Editor in Windows 10

2. Using the Local Group Policy Editor’s left pane, navigate through to the following location:

Computer Configuration\Administrative Templates\Windows Components\Windows Defender Antivirus

3. With Windows Defender Antivirus selected, click on Configure detection for potentially unwanted applications from the right pane. (Click to enlarge the screenshot below.)

Microsoft Defender Antivirus -- Configure detection for potentially unwanted applications

4. From the Configure detection for potentially unwanted applications policy, select either Not Configured (to turn off Windows Defender PUP protection), Enabled (to turn on Windows Defender PUP protection), or Disabled (to turn off Windows Defender PUP protection). (Click to enlarge the screenshot below.)

Note: If selecting Enabled, a drop-down menu appears in the Options window that offers additional options to configure the group policy if you like. For example, from the drop-down menu, you can select Blocked which means the Configure detection for potentially unwanted applications policy will be enabled, and the potentially unwanted programs will be blocked from being downloaded onto your computer. It is suitable for most people to select Blocked from the drop-down menu in the Options window to stop PUPs getting onto your computer in future.

Configure detection for potentially unwanted applications policy settings

You can now close the Local Group Policy Editor and continue using your computer if you like.

Part Two: How to Manually Scan Files, Folders, and Drives with Microsoft Defender in Windows 10

Windows 10 provides the latest antivirus protection with Windows Security. Your device will be actively protected from the moment you start Windows 10. Windows Security continually scans for malware (all types of malicious software), viruses, and security threats. In addition to this real-time protection, updates are downloaded automatically to help keep your device safe and protected from threats.

Some features differ if you are running Windows 10 in S mode. Because this mode is streamlined for tighter security, the Virus & threat protection area has fewer options. However, that does not mean it is less secure—the built-in security of this mode automatically prevents viruses and other threats from running on your device, and you will receive security updates automatically.

Microsoft Defender automatically scans your system periodically, so it should pick up and remove any malware on your computer by itself over time. If you need a quick solution, Microsoft Defender also allows for manual scans so that you can scan any location on the operating system immediately.

Note: The Microsoft Defender antivirus application shown below comes out of the box on all versions of Windows 10, the latest version of Windows operating system. If you are running an older version of Windows, such as Windows 7, then you can skip to one of the next parts that shows you how to install a third-party antimalware application instead.

Option One: How to Scan with Microsoft Defender Using Context Menu

Here is how you can run an antivirus scan with the built-in Microsoft Defender antivirus program from the context menu of a file or folder:

Notes:

  • The Windows Security is available in all versions of Windows 10 after version 1703.
  • Microsoft has changed the name from Windows Defender to Microsoft Defender as of Windows 10 version 1909, and most locations around Windows, including the context menu via File Explorer, will now list the newer Microsoft Defender name if you are running an updated version of Windows 10. Should you be using an older version of Windows 10, however, you may need to click on Scan with Windows Defender… instead of Scan with Microsoft Defender… from the context menu.

1. From File Explorer, select the drivefolder, or file that you suspect may contain the potential malicious program.

2. Right-click on Scan with Windows Defender from the context menu. (Click to enlarge the screenshot below.)

The Downloads folder found within File Explorer; Scan with Windows Defender from its context menu
Select your file, folder, or drive from any area within File Explorer — you can find the main folders by selecting This PC from the navigation pane — and then right-click on it, and select Scan with Windows Defender… from its context menu.

3. When the scan completes, Windows Security will open and show you the results. The total time for the scan to complete will vary. Scanning drives will take the longest, while scanning individual files the quickest. (Click to enlarge the screenshot below.)

Notes:

    • The Windows Security application used to be called the Windows Defender Security Center in previous versions of Windows 10. All the settings within the app remained the same after the name change.
    • Starting with Windows 10 version 1803, the app has two new areas: Account protection and Device security.
Scan options: Custom scan running...
No matter what type of scan you choose, you can always observe the progress bar at the top of the page beneath the Scan options to see how the scan is progressing.

a. If there are no threats found, Windows Security will let you know as much in the same region where it previously showed you the scan was underway. (Click to enlarge the screenshot below.)

Scan options: No current threats found.

b. If there are threats found, however, it will let you know there are threats found, as well as the threat names and locations in the same area. (Click to enlarge the screenshot below.)

Scan options: Threats found. Start the recommended actions.

4. To remove any threats found, click on the Start actions button. (Click to enlarge the screenshot below.)

Note: Clicking on Start actions will result in Windows Security removing the threat immediately.

Windows Security: Start actions

Protection history: Threat found -- action needed
The malware we have used in these screenshots is test malware, designed to imitate how real malware works so that it will show up in Microsoft Defender scan results. We do not ever recommend downloading actual malware onto your computers.

You can now close the Windows Security app and continue using your computer if you like.

Option Two: Scan with Microsoft Defender in Windows Security

Here is how you can run an antivirus scan with the built-in Microsoft Defender antivirus program from the Windows Security app:

1. Open Windows Security. See this tutorial to read all the different ways in which you can open Windows Security in Windows 10: How to Open Windows Security in Windows 10

Microsoft Defender icon in Notification Area

2. Click on the Virus & threat protection icon in Windows Security’s Security at a glance page. (Click to enlarge the screenshot below.)

Windows Security: Security at a glance

3. Do step 4, step 5, step 6, or step 7 depending on what it is that you would like to do.

4. To Run a Quick Scan with Microsoft Defender

a. Click on the Scan now button. (Click to enlarge the screenshot below.)

Windows Security: Quick scan

5. To Run a Full Scan with Microsoft Defender

a. Select Full scan and then click on the Scan now button. (Click to enlarge the screenshot below.)

Windows Security: Full scan

6. To Run a Custom Scan with Microsoft Defender

a. Select Custom scan and then click on the Scan now button. (Click to enlarge the screenshot below.)

Windows Security: Custom scan

7. To Run an Offline Scan with Microsoft Defender

a. Select Windows Defender Offline scan and then click on the Scan now button. (Click to enlarge the screenshot below.)

Windows Security: Windows Defender Offline scan

8. Select the filefolder, or drive that you want to scan and then click Select Folder. (Click to enlarge the screenshot below.)

Custom Scan: Select folder, Razer Blade HDD

9. Microsoft Defender starts scanning the option that you chose. (Click to enlarge the screenshot below.)

Windows Security: Full scan running

10. When the scan completes, you get the results in numbers. (Click to enlarge the screenshot below.)

Scan options: No current threats.
If there are no threats found once the scan has completed, it will say so from the same region that previously showed you the progress bar. This region has changed a bit since the earlier versions of Windows 10; no longer is there a link that allows you to see threat details like previous versions offered. Simplifying this was perhaps a good idea because you should always remove the threat from the computer once it is found.

11. If there are threats found, however, it will let you know there are threats found, as well as the threat names and location in the same area. (Click to enlarge the screenshot below.)

Scan options: Threats found. Start the recommended actions.
When threats are found, it tells you so and let’s you know that you need to get started with the recommended actions by clicking on the Start actions button.

12. To remove any threats found, click on the Start actions button. (Click to enlarge the screenshot below.)

Note: Clicking on Start actions will result in Windows Security removing the threat immediately.

Windows Security: Start actions

Protection history: Threat found -- action needed
The malware we have used in these screenshots is test malware, designed to imitate how real malware works so that it will show up in Microsoft Defender scan results. We do not ever recommend downloading actual malware onto your computer.

You can now close the Windows Security app and continue using your computer if you like.

Option Three: How to Scan with Microsoft Defender from Windows PowerShell

Here is how you can run an antivirus scan with Microsoft Defender from the Windows PowerShell:

1. Open the Windows PowerShell. See this tutorial to read all the different ways in which you can open the Windows PowerShell application in Windows 10: How to Open Windows PowerShell in Windows 10

2. Type the command below that best suits your needs and then press the Enter key on your keyboard to execute it.

Update and Quick scan:
Update-MpSignature; Start-MpScan -ScanType QuickScan

Quick scan:
Start-MpScan -ScanType QuickScan

Full scan:
Start-MpScan -ScanType FullScan

Windows PowerShell: MPScan QuickScan running
Windows PowerShell: MPScan QuickScan completed

You can now close the Windows PowerShell window and continue using your computer if you like.

Option Four: How to Scan with Microsoft Defender from Command Prompt

Here is how you can run an antivirus scan with Microsoft Defender from the command line:

Note: Though Windows Defender has been renamed to Microsoft Defender, Microsoft has not yet updated the commands to reflect this change. Should there come a time when the following commands no longer work, try exchanging Windows Defender for Microsoft Defender in the commands where applicable.

1. Open the Command Prompt. See this tutorial to read all the different ways in which you can open the Command Prompt application in Windows 10: How to Open Command Prompt in Windows 10

2. Type the command below that best suits your needs and then press the Enter key on your keyboard to execute it. (Click to enlarge the screenshot below.)

Update and Quick scan:
"%ProgramFiles%\Windows Defender\MpCmdRun.exe" -SignatureUpdate & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -Scan -ScanType 1

Quick scan:
"%ProgramFiles%\Microsoft Defender\MpCmdRun.exe" -Scan -ScanType 1

Full scan:
"%ProgramFiles%\Windows Defender\MpCmdRun.exe" -Scan -ScanType 2

Command Prompt: Windows Defender ScanType 1

You can now close the Command Prompt window and continue using your computer if you like.

Method Three: How to Remove The Rocket Arcade Adware Using AdwCleaner

If scanning with the Windows Security antimalware protection does not remove the The Rocket Arcade adware, you can try installing a third-party antiadware tool, such as AdwCleaner, and see if that removes the adware infection instead. On most occasions, you can also use an antiadware program such as AdwCleaner to remove the extensions and all other related files remaining on your computer, so you do not have to do any of it manually.

Notes:

  • Unlike with the full version of Malwarebytes that is labeled as such, AdwCleaner does not replace your computer’s current antivirus/antimalware programs. Rather, it is a standalone application that does not need to make any system changes; you install the app and run it like a regular app and Windows Defender, or whatever antivirus solution you use, will continue to run as usual. You also do not need to make any changes to your antivirus either before installing or after removing AdwCleaner.
  • AdwCleaner is only available for the Windows operating system. The lack of a Mac app is not because the developers cannot make a version for Mac, but because there doesn’t appear to be any need for a Mac variant at this time. If you do have malware on Mac, the Malwarebytes antimalware tool should solve it.

1. Download the AdwCleaner application for Windows. See this webpage to download AdwCleaner for your operating system version of choice: AdwCleaner free download

Note: While being similar, the Malwarebytes and Malwarebytes AdwCleaner programs are different; AdwCleaner is specifically designed to cure programs pertaining to adware infections, whereas Malwarebytes handles the rest of the malware infections. The following screenshots are of the AdwCleaner app for desktop; no smartphone version of the app exists yet, though there may come a time when one is required in the future.

2. Once AdwCleaner has finished downloading onto your computer, run it and then agree to the terms and conditions by clicking on the I Agree button.

AdwCleaner terms and conditions

3. Click on the Scan Now button to start scanning your computer for any adware-related files.

AdwCleaner: Scan Now button

4. Wait for the scan to complete; the total time is dependent on the number of files on your computer, but on most occasions, it will be done in less than a minute.

AdwCleaner: Scan in progress
While the scan is in progress, AdwCleaner shows you the number of items that may be PUPs or adware that it has found. AdwCleaner can scan tens of thousands of files in seconds.

5. Keep the Pups and Adware results checked and then click on the Quarantine button.

AdwCleaner: Potentially Unwanted Programs and Adware selected
We recommend the quarantining of all suspected PUPs and adware that the AdwCleaner scan has selected after the scan completion. Only uncheck an item from the list if you are sure you need it.

6. When you see a message from AdwCleaner letting you know that all processes will be closed before the quarantining of adware can happen, save your work before clicking on the Continue button.

AdwCleaner: All processes will be closed before quarantining dialog

7. Once your computer restarts, the AdwCleaner interface will automatically open and then show you that the cleanup is complete.

AdwCleaner: Your cleanup is complete

8. You can also click on the Log File button to download to your computer the log file that contains all the information regarding the threats AdwCleaner cleaned up.

AdwCleaner: Log file

You can now close the AdwCleaner application and continue using your computer if you like.

Method Four: How to Remove The Rocket Arcade Adware Using SpyBot Search & Destroy

If scanning with the Windows Security antimalware protection does not remove the The Rocket Arcade adware, you can try installing third-party antimalware tools, such as SpyBot Search & Destroy, and see if that removes the threat instead. You can also use an antimalware program such as Malwarebytes to remove the extensions and all other related files remaining on your computer, so you do not have to do any of it manually.


Notes:

    • Installing SpyBot Search & Destroy may override Microsoft Defender as the default option from any context menu. Thus some of the other parts of the tutorial above may not be available while SpyBot Search & Destroy is installed on your PC. Windows does this because it can only run one antivirus at any one given time. As soon as you remove SpyBot Search & Destroy from the computer, it will automatically begin showing Microsoft Defender once again.

1. Download Spybot Search and Destroy from the following link:

Notes:

  • Spybot Search and Destroy is only available at the moment for the Windows operating system. If you have malware on a smartphone, you need to use the AdwCleaner tool above.
  • Spybot Search and Destroy has two separate files: one for Windows 10, Windows 8, and Windows 7; and another for Windows Vista and Windows XP. So just make sure you download the right file for your operating system.

2. Click on I want to be protected without having to attend to it myself checkbox and then click on the Next button.

Spybot: Installation and Usage Mode

3. Read through the terms and conditions by scrolling down to the bottom, click on the I accept the agreement checkbox, and then click on the Next button.

Spybot: License Agreement

4. Read through the privacy policy by scrolling down to the bottom, click on the I accept the agreement checkbox, and then click on the Next button.

Spybot: Privacy Policy

5. Choose to accept or decline the special offer by Spybot by clicking on the Decline or Accept buttons.

Note: This is likely an advertisement, either because Spybot is directly associated with the Waterfox browser or because Waterfox was willing to pay to be featured during the installation of Spybot. Watefox is in no way relevant to Spybot software, and you do not need to install it.

Spybot special offer: Waterfox browser

6. If you want to use the free antimalware by Spybot, click on Spybot (without antivirus), and then click on the Next button.

Spybot edition: Install Spybot (free version) without anti-virus

7. If you like, you can scroll through everything Spybot will add itself to on your computer, and then click on the Next button.

Spybot: Ready to install

8. Wait for Spybot to download and install on your computer.

Spybot: Downloading additional files

9. Once the Spybot setup wizard is complete, check or uncheck the options next to where it says Check for new malware signatures and Open Start Center, and then click on the Next button.

Spybot: Complete the Spybot setup wizard

10. From the first Spybot interface you see, click on Associated Tasks from the menu.

Spybot: Associated Tasks menu

11. From the Associated Tasks menu, click on the System Scan link to take you through to where you can run the manual antimalware scan immediately.

Spybot: System Scan via Associated Tasks menu

12. Here you have two options. Click on the Start a scan button under the Last system scan heading. Or, if you prefer, click on the Start a scan link under the System Scan heading in the left menu.

Spybot: Last system scan/Start a scan

13. Wait for the scan to complete. You get a Progress section to monitor if you like, located just beneath where you clicked to begin the scan. Here Spybot lets you know roughly how long you can expect to wait. A scan for the average computer can take a full 30 minutes.

Spybot: Progress bar/scan progression

14. In the Description column, uncheck any of the “threats” that you deem to be safe because you are familiar with them.

Note: Not all of these “threats” listed are actually threats necessarily. For instance, after our scan, Spybot had picked up countless tracking cookies that are associated with websites we have chosen to sign up to and know about; thus, we are satisfied with not only leaving them but choosing to leave them because we may need them. This part of the tool makes it a little less user-friendly than some other tools that will not go to as much detail in the scan. However, if you are a more advanced computer user who is familiar with his or her computer, then you will appreciate the detail of the scan that Spybot has completed.

15. When you are happy with your selections, click on the Fix Selected button.

Spybot scan finished; fix selected "threats"

If your version of Spybot requests for you to restart your computer for the changes it has made to take effect, then go ahead and do that to remove the malware as soon as possible.

You can now close the Spybot application and continue using your computer if you like.

That’s all.

FAQ: Learn More About The Rocket Arcade Adware

Do I Have to Complete All the Methods Before the Malware Is Removed?

No, you do not. Your computer will often be removed from all malware by using one of the methods available. It’s when you try one method, and the malware remains that you should try another method in the tutorial.

Are the Methods Listed in Order of What Should Work Better?

Not necessarily. We often put the Windows Security before third-party applications because if you use Windows, you might prefer solving the problem without having installed another program on the computer. Windows Security is also free to use for your duration of using the operating system, which could mean more convenience to you.

Nevertheless, if you prefer using third-party programs, or your computer is not running Windows, you can skip the Windows Security method and try using the third-party program recommendations instead.

Do I Have to Complete All Parts of the Windows Security Tutorial?

No, you do not. We have listed all the different ways you can run an antimalware scan with Windows Security for your convenience, but you only need to choose one of the methods to remove the malware.

Related Tutorials