Browser Redirect Virus Popup Removal (Chrome/FF/IE)

How irritating is this problem? (2 votes, average: 5.00)

Every PC user know how irritating online ads could be – nowadays they seem to be everywhere and tend to show up on most sites, flooding your screen with obstructive banners, pop-ups, box messages and even redirects to random pages. However, there’s little one could do about such site-generated ads. The only two options you have in such a case are to either avoid the sites that display the advertising materials or get an ad-blocker which would at least partially reduce the amount of marketing content that gets displayed on your browser. However, there is a type of browser adverts that do not come from any site and therefore the aforementioned methods would be ineffective for stopping them. We are talking about ads generated by browser hijackers like Virus. Those are apps that can automatically change the search engine or homepage of your browser (IE, Firefox, Opera, Chrome, etc.) as well as trigger the generation of various form of advertising materials that would show on your screen whenever you try to use your browser irrespective of what page you would go to. In such a case, obviously, it wouldn’t matter what site you are visiting or if you have an ad-blocker installed, the ads would still be there and what’s even worse – your browser would be modified without your permission. Usually, the only effective way of handling such a situation and preventing further irritation from the hijacker software would be to remove it from your PC. This, however, might not be as easy as simply uninstalling any other program from your PC. Although hijackers aren’t some nasty and dangerous Trojan Horses or Ransomware viruses, they are still somewhat tricky to remove if you don’t know where to look for them on your PC. For example, there might not be an installation entry for the hijacker from the list of installed programs in your Control Panel. In other cases, even if there is an entry for the hijacker there and you manage to uninstall it, the unwanted application would still likely stay on your PC. Because of this and because many users have recently complained about Virus and its ability to mess with their browsers, we have made sure to provide our readers with a reliable and easy-to-follow way of dealing with the pesky hijacker. To learn how to get rid of the intrusive application, just visit our removal guide posted down below and follow the steps in it. If you need any additional help, you can always try out the recommended software security tool from the guide or directly ask us for our assistance by using the comments section.

More about browser hijackers/browser page-redirects

Browser hijackers (also known as browser page-redirects) aren’t all that dangerous as such apps are unlikely to directly harm anything on your PC. Because of that, they are normally not categorized as viruses or malware. In fact, apps like Virus are typically legal and a lot of them even have official sites from where users could download them. However, again, having a hijacker on your PC could be quite irritating due to the aggressive advertising that such applications tend to conduct. Of course, the whole purpose of this advertising is earning money by promoting different products such as sites, other apps and software program, web stores, various services, etc. The problem is that the end-user doesn’t really gain anything from that. Sure, certain offers might actually be interesting and appealing but this is really not enough to compensate for the otherwise extremely intrusive behavior of hijackers like Virus. Virus Removal

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab (the “Details” Tab on Win 8 and 10). Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.


Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.

  1. Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click  Properties.
  2. The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
  3. Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.



  • After you complete this step, the threat will be gone from your browsers. Finish the next step as well or it may reappear on a system reboot.

Right click on the browser’s shortcut —> Properties.

NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).


Properties —–> Shortcut. In Target, remove everything after .exe.

ie9-10_512x512  Remove Virus from Internet Explorer:

Open IE, click  IE GEAR —–> Manage Add-ons.

pic 3

Find the threat —> Disable. Go to IE GEAR —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

firefox-512 Remove Virus from Firefox:

Open Firefoxclick  mozilla menu  ——-> Add-ons —-> Extensions.

pic 6

Find the adware/malware —> Remove.
chrome-logo-transparent-backgroundRemove Virus from Chrome:

Close Chrome. Navigate to:

 C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

Rename the Folder to Backup Default

Rename it to Backup Default. Restart Chrome.


Type Regedit in the windows search field and press Enter.

Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Aside from being extremely irritating at times, browser redirecting software might also indirectly expose your system to danger. Again, Virus isn’t some Trojan or Ransomware virus but if you click on its ads, you might land on some sketchy and unreliable page that might represent a security hazard for your system so you’d better stay away from anything coming from Virus or any other similar software

Hijacker distribution

There are many ways for distributing hijackers – spam messages, malvertising adverts, torrents, pirated software downloadables and many more. However, the method that most users seem to fall for is the file-bundling where the pesky software is included in the installer of some freeware program. If you attempt to install that program with the Quick setup configuration, all added/bundled applications would likely get also installed along the main software by default (including the hijacker). Preventing this from happening is actually quite easy – just use the Custom/Advance setup options where you can see what’s been bundled with the main program and opt-out of the installation of anything that might not seem reliable or wanted. After doing so, you should be good to continue and launch the installation process of the program that you want without the added apps.

Type  Adware/Browser Hijacker
Danger Level Medium (nowhere near threats like Ransomware, but still a security risk)
Symptoms  Modifications to your browser that you did not agree is the most typical symptom of a hijacker.
Distribution Method Online ads, misleading web offers, spam letter attachments, software bundles and others.
Detection Tool

Leave a Comment