How to Remove “Malware” (Chrome/FF/IE) Feb. 2019 Update

Parasite may reinstall itself multiple times if you don't delete its core files. We recommend downloading SpyHunter to scan for malicious programs installed with it. This may save you hours and cut down your time to about 15 minutes. 

Download SpyHunter Anti-Malware

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

How irritating is this problem? (4 votes, average: 5.00)

This page aims to help you remove “Malware”. Our removal instructions work for Chrome, Firefox and Internet Explorer, as well as every version of Windows.

You might not know it, but browser hijackers are actually one of the most common and widespread types of unwanted software and although they are not as dangerous or as problematic as virus and malware programs like Trojans and Ransomware, they are still a major software issue not due to their levels of danger but due to their ability to irritate the users and constantly nag them with their obnoxious and never-ending streams of advertisements. At first glance, this might not sound like much but wait until a hijacker latches onto your Chrome, Firefox or Opera browsers and starts bombarding them with all kinds of intrusive advertising banners, pop-ups, flashy box messages and intrusive page-redirects to different sites that are mostly filled with even more ads and questionable online requests. Not only that, but a hijacker could also introduce different changes to the search engine, the homepage or to the toolbar of your browsers. Supposedly, those changes are introduced to help you browse with greater safety or to make your browser better optimized. However, the real purpose of the different modifications that a browser hijacker app is likely to make to your browser is to facilitate the main task of the undesirable app, namely, its advertising activities. With all that in mind, it should be rather obvious that a browser hijacker is likely not a form of software that you’d want to have on your computer and yet, a lot of customers are struggling with such obnoxious software pieces on a daily basis without being able to definitively get rid of the annoyance.

No more ads!

Here, we will give you an example with the recently released “Malware” application which is yet another addition to the already vast browser hijacker family. Since it’s likely that most of you are here because of this particular hijacker anyway, we have decided to show our readers how they can effectively eliminate the irritating “Malware” from their homes in a matter of minutes without the need to bring their PC or laptop to a trained professional. Of course, if you would still prefer to use a IT specialist’s help to get rid of the hijacker, you are free to do so but since you are on this page, it’s safe to assume that you’d first rather try uninstall “Malware” yourself.

Remove “Malware”

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



We get asked this a lot, so we are putting it here: Removing parasite manually may take hours and damage your system in the process. We recommend downloading SpyHunter to see if it can detect parasite files for you.

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab (the “Details” Tab on Win 8 and 10). Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.


Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.

  1. Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click  Properties.
  2. The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
  3. Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.



  • After you complete this step, the threat will be gone from your browsers. Finish the next step as well or it may reappear on a system reboot.

Right click on the browser’s shortcut —> Properties.

NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).


Properties —–> Shortcut. In Target, remove everything after .exe.

ie9-10_512x512  Remove from Internet Explorer:

Open IE, click  IE GEAR —–> Manage Add-ons.

pic 3

Find the threat —> Disable. Go to IE GEAR —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

firefox-512 Remove from Firefox:

Open Firefoxclick  mozilla menu  ——-> Add-ons —-> Extensions.

pic 6

Find the adware/malware —> Remove.
chrome-logo-transparent-backgroundRemove from Chrome:

Close Chrome. Navigate to:

 C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

Rename the Folder to Backup Default

Rename it to Backup Default. Restart Chrome.


To remove parasite on your own, you may have to meddle with system files and registries. If you were to do this, you need to be extremely careful, because you may damage your system.

If you want to avoid the risk, we recommend downloading SpyHunter
a professional malware removal tool.

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

Type Regedit in the windows search field and press Enter.

Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

As you can see from the steps provided to you in our guide manual, uninstalling and fully getting rid of a hijacker app like is not the simplest of tasks. Still, it’s certainly something that most users should be able to achieve on their own as long as they closely follow the instructions from this page. That said, it’s possible that in some rare occasions, the guide might not fully work or that some of you might prefer a quicker and a more automated method of taking care of the hijacker “invasion”. For such cases, we have put inside our removal manual a trusted and highly-effective removal program that can make work of any hijacker or any similar undesirable app (as well as of even actual malware programs). So, go ahead and choose the method that suits you best and get rid of the frustrating and invasive hijacker.

How harmful?

We said at the start of this write-up that hijackers are different from threatening virus programs like, for example, Ransomware infections, Trojan Horse viruses, Rootkits and any other similar category of actual malware. Despite that, you must still be cautious around any hijacker as they could sometimes present you with unreliable and misleading ads and page-redirect you to all kinds of shady online addresses. Of course, this would inevitably put your PC at a considerable risk of getting targeted by a wide variety of viruses and malware programs – something that you certainly don’t want to experience!

How to keep a hijacker away from your browsers?

Basic online safety rules such as avoiding any form of spam or malvertising and never clicking on any form of online content that might be misleading or unreliable are ones you should always apply in order to maintain a safe and clean PC system. Something that a lot of users usually forget (or disregard) is the importance of manually customizing the setup configurations of any new program you want to have on your machine. Never use the Default setup settings as it could additionally install all kinds of bundled bonus apps that you don’t really need or want (including hijackers and adware!). Therefore, instead of opting for the Default option, go for the Advanced/Custom one and make sure to carefully look through the settings there and leave out anything that could potentially be some undesirable and potentially problematic software application.


Type  Browser Hijacker
Danger Level Medium (nowhere near threats like Ransomware, but still a security risk)
Symptoms  A hijacker can mess with your browser settings and flood your screen with ads – this is what is what normally gives away such apps.
Distribution Method File-bundles seem to be the preferred method although other popular ones such as spam messaging and malvertising are also frequently used.
Detection Tool

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment