How The Browser Redirect Virus Works
You’ll know if you have the browser virus. For a start: it will annoy your socks off. Once you’ve got over the regular inconvenience of the pages you want loading, you’ll probably find that upon closer examination, there is something familiar on the page that keeps loading, such as a Google search box.
The Rewritten Hosts File
Windows users should know about the Hosts file, a text file stored on the C:\ drive where a list of blocked website URLs can be stored. As well as blocking URLs with the Hosts file, you can also add lines that specify what websites should appear when a particular IP address is visited.

All you would need to do is find the Hosts file (Windows\System32\Drivers\etc) and open it with Notepad (right-click, then Open with…). Scroll down to the blank space, add a URL or IP address and save the Hosts file; the address is now blocked.
You can also use the same principle to create shortcuts to certain websites to save time typing. The browser redirect virus uses it too, rewriting or replacing the original hosts file with its own data. Chris Hoffman’s guide to the Windows Hosts file explains how this works in far more detail.
Check Your Proxy Settings
Next, check your system’s proxy settings. Browser redirect viruses can use a remote server that isn’t the one you normally connect to the Internet through. By disabling this, you can make a big step towards removing the virus.
In the Control Panel, open Internet Options. In Windows 8, you can type “internet options” to quickly launch this screen. Click the Connections tab and look for LAN Settings. You’ll probably find that the Proxy Server option is checked, with or without an address. Clear the check box and click Automatically detect settings instead, then click OK to confirm and exit.
Top Tools for Removing the Browser Redirect Virus
Several tools are currently available that can be used against a browser redirect virus. Some experts suggest running all of these, sometimes in order, whereas others recommend just running a couple.
followed by the reliable malware . For extra checks, use hitman pro.
MalwareBytes’ Anti-Malware Free

This will run automatically once installed, and a message will be displayed advising you to update. Click Fix Now to run the first scan. When this is complete (the software may ask you to click the Update button first) you should be shown a screen listing the threats that have been found. Click Quarantine All, then Apply Actions.
malware: http://viahold.com/1w6m
HitmanPro

Following installation (a one-time run option, without istallation, is also available), HitmanPro will scan your computer for stubborn rootkits, malware and any related files. Files will be displayed as they are discovered, and when the scan is complete click Next to remove them. You’ll need to click Activate free license to get the free 30 day trial for HitmanPro, unless you plan to purchase.
hitman pro : http://viahold.com/1x0n
Finally, Reset Your Browser
With your scans completed, and the removal tools’ work done, there is one final step. To remove the last vestiges of the threat, you will need to reset your browser. Depending upon which browser you’re using, this will differ.
- Internet Explorer: click the Settings button, then Internet Options > Advanced, where you’ll find the Reset button. Ensure you select Delete personal settings before clicking Reset, then click Close when the process has completed and restart your browser.
- Mozilla Firefox: open Menu > Help > Troubleshooting Information, where you’ll find the Reset Firefox… button. Click this and confirm to reset the browser.
- Google Chrome: in the hamburger menu, choose Settings or enter the chrome://settings URL in the address bar. From here, click Show advanced settings… and scroll down to the Reset settings button. Click this, then confirm in the following box to reset the browser.