Browser Redirect

How to Remove “Virus” (Chrome/Firefox)

Parasite may reinstall itself multiple times if you don't delete its core files. We recommend downloading SpyHunter to scan for malicious programs installed with it. This may save you hours and cut down your time to about 15 minutes. 

Download SpyHunter Anti-Malware

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

This page aims to help you remove These “Virus” removal instructions work for Chrome, Firefox and Internet Explorer, as well as every version of Windows.

Browser hijackers like are among the most irritating programs one could think of when it comes to undesired and intrusive advertisement invasion. If you agree with us, you are probably experiencing firsthand all the possible ad-generating, box popping, search engine manipulating and page redirecting activity one could think of – all delivered by a program like “Virus”. This software may apply some potentially undesired changes to your Chrome, Firefox, Explorer or other browser, redirect your searches and change your homepage and search engine. Thankfully, there is a way to get rid of all these changes and bring your browser back to normal. The removal guide below is made just to help you do that and if you follow all of its instructions closely, you will be able to effectively uninstall this annoying browser hijacker from your system once and for all. Browser Hijacker Browser Redirect

What is a browser hijacker?

Browser hijacker is a common term used to describe applications that are programmed to make certain changes to your browser settings in order to display a huge amount of online advertising materials. They are usually used as effective online advertising tools that promote different sponsored services and products that may come in the form of ads, banners, pop-ups, links, new tabs blinking boxes and web pages. Commonly, the ads that the browser hijackers display are paid and every time users click on them, this accumulates income for the owners of the software that is displaying them. Actually, these paid clicks are the foundation of a very popular online business model known as Pay-Per-Click, which many businesses and software developers are taking advantage of. In terms of legitimacy, this model is perfectly legal. However, its irritating effect may still be a reason for many users to remove the browser hijacker that is delivering the paid ads on their screen.

Footybase “Virus?

A lot of our readers mistakenly believe Footybase to be a “virus”. Usually, applications like Footybase are developed with the sole idea to generate money through the above-mentioned method. For that purpose, they are often programmed not only to apply some changes to your browser settings, but they may also research the user’s browsing habits. A browser hijacker may keep track of your browsing history, your search queries, likes and shares on social media with the idea to create a user’s profile and preferences list. Then this program may try to match the sponsored advertisements it displays with your interests. At some point, this may not be that bad, as you may really find some ads that interest you, but some users may not like the idea of being tracked down. Moreover, it is not really clear who may see the collected information because this program may transmit it to third parties or sell it as valuable marketing information to some marketers.

Another thing related to this program is the significant lag it may cause to your browser and your system overall. The sluggish system performance, the screen freezing effect and the slow loading of pages in your browser are just some of the undesired side effects that you may experience if you keep this program on your computer. However, we should relief everyone who might be thinking that this is a bad virus infection. is not a “virus”, and neither are browser hijackers in general. These programs may be a source of system disturbance and browsing related irritation, but they cannot harm your computer the way real malware like a Trojan or Ransomware could.

How is this software distributed?

In order to avoid such intrusive software in the future, you should know where you can find it and how to prevent it from getting installed. Programs like may often be found inside software bundles where they are packed with other usually free and attractive software. The thing with these bundles is that if you don’t customize them manually (which is easily done through the advanced/custom option), you usually get all the bundled programs installed by the standard option. This is how many users end up with browser hijackers and other potentially undesired software on their computers, especially when they skip the advanced/custom settings. That’s why it is not a good idea to overlook these options. Our advice is to always check the installers for additional software because this way you will not only save yourself from nagging applications but may also prevent the installation of some real malware like a Trojan or even Ransomware. In addition, it is worth to pay attention when interacting with different file sharing platforms, free software sites, download managers, torrents and spam emails with different attachments. This is where most bloatware could be found as well as some really malicious and harmful viruses and threats. So, for your own safety, stick to trusted sources as much as possible and avoid downloading sketchy content on your machine.


Type Browser Hijacker
Danger Level Medium (nowhere near threats like Ransomware, but still a security risk)
Symptoms  The hijacked browser loads series of ads and pop-ups, redirects your searches and replaces your homepage and search engine.
Distribution Method This program may often be found inside software bundles, spam emails and attachments, torrents, file sharing sites, download managers and freeware platforms.
Detection Tool

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version.
More information about SpyHunter and steps to uninstall.


How to Remove “Virus” (Chrome/Firefox)



Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).


To remove parasite on your own, you may have to meddle with system files and registries. If you were to do this, you need to be extremely careful, because you may damage your system.

If you want to avoid the risk, we recommend downloading SpyHunter
a professional malware removal tool.

More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

Reveal All Hidden Files and Folders.

  • Do not skip this  – may have hidden some of its files.

Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.


Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.

  1. Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click  Properties.
  2. The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
  3. Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.



Right click on the browser’s shortcut —> Properties.

NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).


Properties —–> Shortcut. In Target, remove everything after .exe.

ie9-10_512x512  Remove from Internet Explorer:

Open IE, click  IE GEAR —–> Manage Add-ons.

pic 3

Find the threat —> Disable. Go to IE GEAR —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

firefox-512 Remove from Firefox:

Open Firefoxclick  mozilla menu  ——-> Add-ons —-> Extensions.

pic 6

Find the adware/malware —> Remove.
chrome-logo-transparent-backgroundRemove from Chrome:

Close Chrome. Navigate to:

 C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

Rename the Folder to Backup Default

Rename it to Backup Default. Restart Chrome.

  • At this point the threat is gone from Chrome, but complete the entire guide or it may reappear on a system reboot.


Press CTRL + SHIFT + ESC simultaneously. Go to the Processes Tab. Try to determine which ones are dangerous. Google them or ask us in the comments.


We get asked this a lot, so we are putting it here: Removing parasite manually may take hours and damage your system in the process. We recommend downloading SpyHunter to see if it can detect parasite files for you.

Right click on each of the problematic processes separately and select Open File LocationEnd the process after you open the folder, then delete the directories you were sent to.



Type Regedit in the windows search field and press Enter.

Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

Remember to leave us a comment if you run into any trouble!

Leave a Comment