Remove Malware

Remove MalwareRemove MalwareRemove Malware

This article aims to help users remove malware from Chrome, Firefox, Internet Explorer and Safari, as well as their respective system.

Remove Malware malware is a fairy new type of malware virus which has been spreading extremely fast in the last few months. It usually infects computers through an unintentional interaction done by the user like opening an e-mail attachment, downloading data from suspicious torrent sites or even during the installation of what seems a legitimate software product. Most free software products include something like that masked as an unsuspicious toolbar, downloader or something similar in a process called program bundling – when the installer of one program can install multiple others.

Dangers that go along malware malware may have a variety of negative effects upon your browser and system. For starter it significantly slows down your browsing speed. It may change your search engine search results leading you to a variety of fake pages which looks similar to the legitimate ones. Opening one of those pages may further infect your computer with other malicious software. malware may cause unwanted popups to appear preventing normal use of your computer. Quite often those pop-ups promote dating sites (with the appropriate pictures. Imagine happening on your work computer) or fake antivirus products. It is very important not to install anything coming out from those pop ups. Each time you click them or one of the fake links you risk infecting yourself with another type of virus, making it even harder to get rid of.

The most severe threat malware is its ability to potentially access your stored credit card accounts and details and send them back to its creator. The consequences of it could be severe and will most likely overweight the effect of some slower browsing and annoying pop ups. Some versions of malware can even track data stored on your computer hard drive or even give unauthorized access to your computer

1: Enter Safe Mode.
2: Remove malware from Chrome, Firefox, Internet Explorer and Safari.
3: Remove the virus from browser shortcuts.
4: Uninstall the virus from your AddRemove Programs.
5: Permanently remove malware from Task Manager’s processes.
6: Delete the virus from Regedit and Msconfig.
7: Optimize your PC after the removal is done.

Remove malware


Our first step here is a reboot in Safe Mode. If you already know how to do it, just skip this and proceed to Step 2. If you do not know how to do it, continue reading:

For Windows 98, XP, Millenium and 7 Users:

Restart your computer. To be sure you don’t miss the time when you need to press it, just spam F8 as soon as the PC starts booting. In the new menu, choose Safe Mode With Networking.

Remove Malware

Proceed to Step 2.

For W. 8 and 8.1 Users:

Click the Start button ,then Control Panel —> System and Security —> Administrative Tools —> System Configuration.Remove Malware

Remove Malware

Then check the Safe Boot option and click OK.  Click  Restart in the new pop-up.

Proceed to Step 2.

For Windows 10 Users:

  1. Open the Start menu.
  2. Click the power button icon in the right corner of the new Start menu to show the power options menu.
  3. Press and hold down the SHIFT key on the keyboard and click the Restart option while still holding down the SHIFT key.

Windows 10 will perform the reboot. Next do the following:

Click the Troubleshoot icon, then Advanced options —> Startup Settings. Click Restart.
After the reboot click on Enter Safe Mode With Networking (Fifth Option).

Continue with Step 2.

STEP 2: malware has likely infected ALL of your internet browsers and now you need to remove it from every single one of them. Make sure you are through, otherwise the virus could regenerate from any remaining copy and re-infect everything on next system reboot. The removal process involves running Step 2 and Step 3 for each browser installed on your computer. Don’t forget to include even older browsers that you might not be using lately as is the case with Internet Explorer for people who rely on Chrome or Mozilla.

Remove Malware  For Internet Explorer Users:

Open IE, then click  Remove Malware —–> Manage Add-ons.

Remove Malware

Find malware . Remove it by pressing Disable.

If your Home Page is different from the usual, click Remove Malware —–> Internet Options>edit the URL box with your preferred search engine, and click Apply.

Go to STEP 3.

Remove Malware  For Mozilla Firefox Users:

Open Firefoxclick on Remove Malware (top right) ——-> Add-onsHit Extensions next.

Remove Malware malware  should be somewhere around here –  Remove it.

Go to STEP 3.

Remove Malware For Google Chrome Users

 Start Chrome, click Remove Malware —–>More Tools —–> Extensions. There,  find the virus and  select  Remove Malware(Remove).

Remove Malware

 Click Remove Malware again, and proceed to Settings —> Search, the fourth tab, select Manage Search Engines.  Remove anything but the search engines you normally use.

Go to STEP 3.

Remove Malware For Safari Users:

Open Safari, and click Safari —–>Preferences —–> Extensions—–>Uninstall the malware.

Go to STEP 3.


Right click on the browser’s shortcut, then click Properties.

NOTE: We are showing Google Chrome, but the method is the same for all browsers.

Remove Malware

Once you’ve reached Properties —–> Shortcut (on the band at the top), then in the Target type field, REMOVE EVERYTHING AFTER .exe.

Remove Malware

Continue with STEP 4.


Hold the Windows Key and R together. Write appwiz.cpl in the new field, then click OK.

Remove Malware

You are now in the Control Panel. Search around for malware and anything else suspicious-looking. Uninstall it/them. Also, be extremely careful. Viruses often spend one last ditch effort to trick you into installing more of their kind. If you see a screen like this when you click Uninstallchoose NO:

Remove Malware

Hold the Windows Key and R againbut this time copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A .txt file will open – don’t touch anything there. If you are hacked and someone has access to your PC, there will be a bunch of other IPs connected to you at the bottom. This is what a hosts file looks like:

Remove Malware

If there are a bunch of strange IPs connecting to you below “Localhost” you may be hacked, and it’s best to ask us in the comments for directions.

Go to STEP 5.


Open the Task Manager by right clicking on the Taskbar and choosing Start Task Manager.

Remove Malware

Once it opens, choose the Processes Tab. Look at all of the processes in front of you and try to determine which ones are a virus. Google them or ask us in the comments and we will provide the best assistance we can.



Step 5 is the hardest one and the most important. You will have to be very careful otherwise you risk damaging your computer. Removing the wrong thing may lead to glitches, inconsistent performance and potentially lost data. If you lack the technical expertise to do this on your own, we advise you to download a professional malware remover. You can afterwards use the automated scanner that comes with the program to search your computer for other viruses, that remain invisible to the naked eye until the point that nothing can be done. Ransomware viruses in particular could make your whole HDD unusable unless you pay a hefty ransom in the range of 300-500$!

Remove Malware

Right click on each of the virus processes separately and select Open File Location. Also, End the process after you open the folder. Just to make sure we don’t delete any programs you mistakenly took for a virus, copy the folders somewhere, then delete the directories you were sent to.

Move on to STEP 6.


Take a look at the following things:

Type msconfig in the search field and hit enter: you will be transported to a new window. 

Remove Malware

Go in the Startup tab and Uncheck anything that has “Unknown” as Manufacturer.

Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If you can’t find them this way, look in these directories, and delete the registries manually:

  • HKEY_CURRENT_USER—-Software—–Random numbers
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

Remember to leave us a comment if you run into any trouble!

Did we help you? Please, consider helping us by spreading the word!

STEP 7 – Optimization

We’ve prepared a short and sweet optimization guide, specifically designed for users who just removed a virus. It is completely free, you do not need to download anything, and it’s not very time consuming. If you are interested – How To Remove Guide’s Optimization Tips.


About the author


Nathan Bookshire

1 Comment

Leave a Comment