Alphago “Virus” Removal (June 2017 Update)

Keep in mind, SpyHunter’s malware & virus scanner is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.


This page aims to help you remove Alphago “Virus”. Our removal instructions work for Chrome, Firefox and Internet Explorer, as well as every version of Windows.

Browser Hijackers are certainly not the most pleasant or helpful type of software that you can have on your PC. Most programs of this kind tend to cause a variety of unwanted changes to the user’s Chrome, Firefox, Edge or IE browser like for example replacing the previous search engine with some new and one that has questionable quality or change of the regular browser homepage. Also, Hijackers are known to trigger irritating page redirects to random websites without the user’s permission. In fact, most of what this type of software does is issued without the agreement of the user, which is yet another reason why normally Hijackers are regarded as potentially unwanted programs. Here, we will be talking about Alphago “Virus” – a newly released program that has been reported to display traits similar to those of a typical Hijacker. Since a lot of you have likely come here in search for a way to get rid of Alphago “Virus” because it has already gotten installed onto their computer, we have prepared a guide with instructions on how to uninstall and remove the pesky software for good. Make sure to check out the guide once you’ve finished reading the rest of the main section of the article.

Why are there so many Browser Hijackers?

The fact is that there are thousands of programs out there that can be categorized as Browser Hijackers. Currently, this is one of the most widely spread type of potentially unwanted software and there is a reason for that. Browser Hijackers can be extremely profitable for their developers as long as they get installed onto a sufficient number of computers. Programs like Alphago “Virus” earn money through online marketing by employing various aggressive advertising techniques (hence, the unwanted browser changes, page redirects and other potentially intrusive content caused by the Hijacker). In order to get their products to reach as many users as possible and thus further increase the overall profit from them, the people who create Browser Hijackers might try to promote their programs as being helpful and beneficial to the user. This actually seems to work since a lot of customers would in fact willingly install a Hijacker on their PC, thinking that it will improve their PC performance, make their online experience safer or add new useful features to their browser. The sad truth is that in the majority of cases the Hijacker would only seem to do that while instead it would actually worsen each of those aspects.

Alphago “Virus” Removal

If you are a Windows user, continue with the guide below.

If you are a Mac user, please use our How to remove Ads on Mac guide.

If you are an Android user, please use our Android Malware Removal guide.


Step1

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

We get asked this a lot, so we are putting it here: Removing parasite manually may take hours and damage your system in the process. If you want a fast safe solution, we recommend SpyHunter. 

>> Click to Download Spyhunter. If you don't want this software, continue with the guide below.

Keep in mind, SpyHunter’s malware & virus scanner is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab (the “Details” Tab on Win 8 and 10). Try to determine which processes are dangerous. 

malware-start-taskbar

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/




Scan Results


Virus Scanner Result
ClamAV
AVG AV
Maldet

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

Step3

Hold together the Start Key and R. Type appwiz.cpl –> OK.

appwiz

You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

Type msconfig in the search field and hit enter. A window will pop-up:

msconfig_opt

Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

Step4

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.

  1. Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click  Properties.
  2. The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
  3. Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.

DNS

Step5

  • After you complete this step, the threat will be gone from your browsers. Finish the next step as well or it may reappear on a system reboot.

Right click on the browser’s shortcut —> Properties.

NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).

browser-hijacker-taskbar-properties

Properties —–> Shortcut. In Target, remove everything after .exe.

ie9-10_512x512  Remove Alphago “Virus” from Internet Explorer:

Open IE, click  IE GEAR —–> Manage Add-ons.

pic 3

Find the threat —> Disable. Go to IE GEAR —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

firefox-512 Remove Alphago “Virus” from Firefox:

Open Firefoxclick  mozilla menu  ——-> Add-ons —-> Extensions.

pic 6

Find the adware/malware —> Remove.
chrome-logo-transparent-backgroundRemove Alphago “Virus” from Chrome:

Close Chrome. Navigate to:

 C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

Rename the Folder to Backup Default

Rename it to Backup Default. Restart Chrome.

Step6

WARNING!
To remove parasite, you may have to meddle with system files and registries. Making a mistake and deleting the wrong thing may damage your system.
Avoid this by using SpyHunter - a professional Parasite removal tool.

Keep in mind, SpyHunter’s malware & virus scanner is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.

Type Regedit in the windows search field and press Enter.

Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

SUMMARY:

Name Alphago
Type Browser Hijacker
Danger Level Medium (nowhere near threats like Ransomware, but still a security risk)
Symptoms Most Hijackers reveal themselves when they start to mess with the user’s browser, change its homepage or search engine or cause irritating redirects to random webpages.
Distribution Method Obscure online ads, deceitful Internet offers or even fake browser warnings, different forms of online spam (e-mail letters, Facebook or Skype messages, etc.) and also program-bundling are among the most frequently used techniques for spreading Hijackers.
Detection Tool We generally recommend SpyHunter or a similar anti-malware program that is updated daily.

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version. More information about SpyHunter and steps to uninstall.

Potential security risks coming from Alphago “Virus”

When compared to real software viruses like Ransomware, Trojans or Spyware, Browser Hijackers aren’t actually all that harmful. Most of the time having such a program on your PC would be nothing but a mere annoyance that you’d need to remove. However, we ought to inform our readers that even though Alphago “Virus” is nowhere as malicious or as damaging as a Trojan horse virus or as Ransomware, it can still prove to be potentially hazardous for your computer system. The unauthorized changes that Hijackers tend to make to your browser and your internet settings can sometimes lead to weak spots in your PC’s security making its system more vulnerable to attacks. In addition to that, the page redirects might open untrustworthy websites which can further expose your machine to various online hazards. This means that even though Alphago “Virus” might not be capable of causing any direct damage to your computer, it might still prove to be a potential security risk which is why you ought to be careful around it and see to its removal as soon as possible.

Methods used to spread Browser Hijackers

Since not many users would actually willingly install a Hijacker on their PC, the developers of those programs have found other ways to get their software inside people’s computers. One common example is when the unpleasant program is send via some form of spam message. It could be a spam e-mail or a message send to the user’s Skype or Facebook (or any other social network account). The Hijacker would normally be added to the message as a file attachment or as a download link. Once the user interacts with the link or the attached file, the undesirable software would get inside the PC. Another common technique is the use of misleading browser ads, banners or offers that are normally displayed within unreliable data-sharing websites or sites with adult content. In addition to the previously mentioned distribution methods, a lot of applications like Alphago “Virus” are also commonly bundled with other programs, which enables them to get installed together with the other program. There, however, is a simple way to avoid this. Just make sure that the next time you want to install a new piece of software on your PC, you carefully check the setup menu for any optional installs that can be unchecked and thus left out before the installation is launched. If there is something bundled to the main program and it appears to be suspicious and possibly unwanted, simply remove the tick next to it and it won’t get installed. In some instances, you would need to access the Advanced installation settings in order to gain access to the options regarding the bundled applications so keep that in mind.


  • HowToRemove.Guide Team

    Remove all of them and save the changes to the Hosts file.