How to remove Untabs Virus Extension (Uninstall Guide) Feb. 2019 Update

Parasite may reinstall itself multiple times if you don't delete its core files. We recommend downloading SpyHunter to scan for malicious programs installed with it. This may save you hours and cut down your time to about 15 minutes. 

Download SpyHunter Anti-Malware

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

This page aims to help you remove the Untabs Virus. Our removal instructions work for Chrome, Firefox and Internet Explorer, as well as every version of Windows.

It is undoubtedly a rather unpleasant experience to have your Chrome, Firefox, IE or whatever other type of browser you might be using infiltrated by some strange and fishy piece of software that seems to be executing certain tasks that it was not permitted to. Normally, programs that do this are referred to as Browser Hijacker and in the following lines we will be focusing on one such particular program that is known under the name of Untabs Virus. Users who have had this piece of software installed onto their PC would usually report that it has changed their browser’s frontpage as well as that it has installed some new obscure search engine on the browser replacing the default one with it. In some cases, it also seems that Untabs Virus tend to trigger page redirects or generate pesky pop-ups that worsen and obstruct one’s browsing experience. If you, too, are going through such an unpleasant issue at this moment, we might be able to help you resolve it. Once you finish reading the current article, go to our guide that is located down below and use it to remove the intrusive piece of software from your machine. The instructions are easy to follow and should enable you to quickly and effectively uninstall and remove the nagging browser Hijacker.

What are Hijackers primarily used for?

It should be obvious by now that most programs similar to Untabs Virus would hardly ever provide the user with any actual form of helpful or beneficial function. There are, of course, exceptions where a seemingly annoying program might actually prove to contain some actual use but this is hardly ever the case. The truth is that the majority of Browser Hijackers are developed with the single purpose of generating income for their creators by implementing and exploiting a variety of different techniques that mostly have something to do with the online marketing industry. However, the problem with Hijackers isn’t only the fact that they can be extremely annoying and irritating but also that in certain situations, they can potentially compromise your system’s security especially if you aren’t careful around them. You can learn more about that in the next paragraph.

What are the dangers?

First and foremost, we ought to let you know that normally, programs like Untabs Virus aren’t real PC viruses. Although a lot of experts and researchers might refer to them as malware, Hijackers are nowhere near as problematic or as harmful as viruses the likes of Trojan Horses, Ransomware, Spyware, etc. A typical Hijacker wouldn’t try to harm your system or mess with the files that are on its hard-drive. However, certain security weaknesses and exploits might get triggered due to the Hijacker’s presence on your system. One important thing to be careful with is the potential page redirects and pop-ups that some of those programs might generate. Interacting with them is very inadvisable since you never know what site may open and what its contents may be. Generally, if you think that you have a Hijacker on your computer, you should do your best to avoid clicking on anything that might come from it and also see to the unwanted software’s removal ASAP.

Hijacker distribution and security tips

Untabs Virus is actually quite innocent if compared to actual viruses such as the infamous Trojan Horses or the insidious Ransomware. However, if you do not learn how to protect your computer from potentially unwanted and hazardous software, you might end up landing all sorts of nasty programs that could cause way more problems than a Hijacker. For that, you should have a good idea about what are the most frequently employed methods for spreading such types if undesirable software. You probably already know that spam e-mails are an extremely popular tool for distributing shady applications so make sure to avoid opening any sketchy online letters that you might receive. Another thing to keep in mind is that not all Internet ads that you see are safe. In fact, a large portion of the pop-ups, banners and box messages that might appear in your browser might actually serve as redirect links to all sorts of unreliable sites that might be hazardous to your computer’s security. Since most such obscure advertising materials can normally be found throughout the pages of fishy and potentially illegal sites, we strongly advise you to keep away from any web-addresses that you do not seem to be trusted. Lastly, never install anything on your PC before checking the setup wizard for application bundles. Oftentimes Hijackers and other forms of unwanted software get added to the installers of other programs and get installed along them if not unchecked from the setup menu. Do not make that mistake! As soon as you see that there’s something that might be unwanted added to the main program, uncheck it for good measure.



Name Untabs
Type  Adware/Browser Hijacker
Danger Level Medium (nowhere near threats like Ransomware, but still a security risk)
Symptoms  Various changes to the browser that have been implemented without the user’s approval.
Distribution Method Malvertising, e-mail/social network spam, unreliable download sources and sketchy torrent sites. Also, file bundles.
Detection Tool

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version. More information about SpyHunter and steps to uninstall.

Untabs Virus Removal

If you are a Windows user, continue with the guide below.

If you are a Mac user, please use our How to remove Ads on Mac guide.

If you are an Android user, please use our Android Malware Removal guide.


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



We get asked this a lot, so we are putting it here: Removing parasite manually may take hours and damage your system in the process. We recommend downloading SpyHunter to see if it can detect parasite files for you.

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab (the “Details” Tab on Win 8 and 10). Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.


Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.

  1. Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click  Properties.
  2. The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
  3. Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.



  • After you complete this step, the threat will be gone from your browsers. Finish the next step as well or it may reappear on a system reboot.

Right click on the browser’s shortcut —> Properties.

NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).


Properties —–> Shortcut. In Target, remove everything after .exe.

ie9-10_512x512  Remove Untabs Virus from Internet Explorer:

Open IE, click  IE GEAR —–> Manage Add-ons.

pic 3

Find the threat —> Disable. Go to IE GEAR —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

firefox-512 Remove Untabs Virus from Firefox:

Open Firefoxclick  mozilla menu  ——-> Add-ons —-> Extensions.

pic 6

Find the adware/malware —> Remove.
chrome-logo-transparent-backgroundRemove Untabs Virus from Chrome:

Close Chrome. Navigate to:

 C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

Rename the Folder to Backup Default

Rename it to Backup Default. Restart Chrome.


To remove parasite on your own, you may have to meddle with system files and registries. If you were to do this, you need to be extremely careful, because you may damage your system.

If you want to avoid the risk, we recommend downloading SpyHunter
a professional malware removal tool.

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

Type Regedit in the windows search field and press Enter.

Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment