Remove Google Redirect Virus (Update January 2020)

Google Redirect Virus – Removal Instructions

Google Redirect Virus continues to plague users globally. This redirect is among the most dangerous, annoying and difficult to remove infections that are now spreading through the World Wide Web.

Google Redirect “Virus”

The Google redirect “virus” is causing redirection of the Google search results. Users have been reporting for a few years now that every time when they click on a desired search result, instead of going to the original page, they are being redirected to third-party sites. Such web locations can be very dangerous, since they are well known to either scam users, install adware PUPs (potentially unwanted programs) or infect them with malware.

Threat Summary

NameGoogle Redirect Virus
Short DescriptionExecutes redirect scripts into legitimate Google search results.
SymptomsRedirects to third-party sites of unknown origin by clicking on search results. Difficulty to remove.
Distribution MethodBy clicking on a malicious link. By opening a malicious email attachment.
Detection Tool See If Your System Has Been Affected by Google Redirect Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Google Redirect Virus.

Google Redirect Virus – Why Are You Experiencing This?

Google Redirect virus is the type of threat that is very similar to other redirect viruses of it’s kind, for example Bing Redirect virus, Yahoo Redirect virus and Bing Mac Redirect virus.

When the user of the Google redirect virus affected PC is doing a search in Google, the search machine shows approximately ten links. When the user clicks on these links he is redirected to advertisement or hacker hoax webpages. These pages are designed to trick the user and to steal one’s personal information.

The experts sometimes refer to this virus as Yahoo redirect virus or Bing redirect virus, as the same infection affects the other search engines too. A new variant of this infection has been recently found and called Happili redirect virus and Nginx redirect virus. All these symptoms are caused by the same group of computer infections.

To be more precise, there isn’t one particular virus responsible for the so-called Google redirect virus, or the similar redirects mentioned above. This term is used to describe various issues and infections stemming from malware or viruses leading to redirecting users to Google or a page that is made to look like the search engine. In fact all the displayed search results will lead to further issues and interacting with them is not advisory, to say the least.

Google Redirect Virus: Technical Details

According to security researchers, the virus has been reported to link to many suspicious sites, the most notorious of which are:

  • (One of the most famous browser hijacker related search engines).
  • (Ad-supported online adult website).
  • ad-supported service that can be exploited via malvertising).
  • (known associations with ZeroAccess rootkit).

Besides those, there are several other sites believed to be associated with the Google redirect virus:

→“,,,,,,,,,,, AboutBlank,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, (Clicksor),,,,,,,,,, (expand search answers),, (starFeedsMixer),, (FilesCup),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, YouPorn,, ( popups),,,,,,,,,,,,, (neat search server ZeroAccess rootkit),,,,,,,,,,,,,,,,,,,, (,,,,,,,,,,,,,, Social Search Redirect,,,,,,,,,,,,,,, (tazinga!),,,,,,,,,,,,,,,, (vShare),,,,,,,,,, and”

Google redirect virus won’t be easy to locate and recognize, as it won’t display any visible signs as with other virus-related scams (e.g. tech support scams). In fact, the redirect aims to do exactly the opposite – stay concealed within your machine for extended periods of time to monitor your online activities. Cybercrooks usually seek to infect PCs on a massive scale as parts of different campaigns. Such campaigns ensure them different benefits, some of which may be generating profit and obtaining different information about worldwide users. If they have one user’s information, it won’t be nearly enough to satisfy their malicious needs. However, if infections are done on a massive scale that allows them to be very powerful. More so, they can make money on pay-per-click schemes by receiving profit per percentage as a part of an affiliate agreement or a particular contract. This is a more advanced marketing strategy that may aim to push the above-mentioned sites’ traffic upwards.

According to Wiki researchers, the Google redirect virus is believed to be associated with the following processes, DLL files, registry values and other objects on your PC:


C:\Documents and Settings\All Users\Application Data\_VOIDmainqt.dll

Other Files

Registry Keys

Furthermore, Symantec researchers have identified a new malicious threat associated with the virus, naming it Backdoor.Tidserv. Also, they have created a removal tool especially for this virus, calling it the Backdoor.Tidserv removal tool.

In addition, Symantec researchers believe that this threat uses sophisticated rootkit–like behavior with the purpose of staying undetected for longer periods of time. Such threats are created with one and only purpose – to generate profits to their author. Most adware applications only display three to four ad-supported search results, pop-ups or sometimes redirects. This threat may display redirects from genuine links on the computer. So in case you get redirected multiple times by clicking on genuine links you know for sure are legitimate (Facebook, eBay, etc.) this is a clear, sign that you have the Google redirect virus on your system.

What Is a Rootkit?
First of all, rootkits can be both malicious and legitimate. Some rootkits can be installed as parts of legitimate apps.

Malicious rootkit is the type application that no user wants to ever encounter. It is an application designed to hide its presence, or the presence of another program, on the system. To do so, rootkits use some of the lower layers of the OS such as API function redirection. This approach makes rootkits very persistent to detection, at least by average anti-malware program.

How do rootkits infect systems? The most common distribution method is via Trojan horses or malicious email attachments. Nonetheless, there are other infection vectors, including the installation of dubious plugins and the overall unsafe user behavior.

Outcomes of Google Redirect Virus

The Google redirect virus can lead to many other infections. Some of them are simple like modification of the host file, others however are very serious as they are state-of-the-art computer rootkits like the fearsome rootkit from the TDSS family. The rootkit infections are hard to be removed, as they are quite different from the ordinary virus. When the PC user is affected by a simple virus, it can be deleted from the hard drive. The users have to search through the system when not loaded and get an idea of the situation.

The rootkit infections are different. They are viruses written in a special way that get inside the computer and integrate into the heart of the operating system. The rootkits make the users’ PC windows show them things that they hide the things that should be there and show things that do not exist. In addition to that, the rootkit of Google Redirect Virus can download Trojans.

Why Is Removing Google Redirect Virus So Difficult?

All computer experts confirm that the removal of this redirect is very difficult. This virus has the power to alter the Master Boot Record (MBR) and make a partition of its own. The experts cannot find this when Windows is running and without special anti-rootkit techniques.

When infected, some of the main windows files will be patched and the operating system will keep on working as intended. However the patched files can receive commands from hackers and then they can do anything they want to the user’s system. It is not simple to delete these files, as windows will not boot.

Other Redirects Similar to Google Redirect “Virus”

Did clicking on Google Search results redirect you to ads? That is not surprising, as users have been affected by several aggressive redirects that compromise browsers such as Google Chrome and Mozilla Firefox. Below you can find a list of currently active redirects that you should be aware of:

Note that there might be even more advertisements and redirect links stemming from hijackers and pop-ups related to Google Virus redirects.

Remove Google Redirect Virus – Instructions

Complete removal is not possible with the rootkit infection. In order to fix this problem, the user will need professional removal tools. Here is what the user can do on his own:

  • Remove the suspicious extensions and add-ons from the browsers Internet Explorer, Mozilla Firefox or Google Chrome.
  • Reset browser settings.
  • Manually remove the browser hijacked homepage.
  • Manually remove the unwanted search engine.
  • Modify the Windows hosts file and delete the unwanted IP addresses.
  • Review the Domain Name Server (DNS), as it might be poisoned.
  • Check the proxy settings.

It is also an essential strategy to disconnect the web connection and boot the computer in Safe Mode while performing the actions described above. Experts highly recommend to download an offline installer of the latest version of an advanced malware protection from a safe PC and install it in the infected computer in order to scan and remove all traces of Google redirect virus completely.

Also, in order to be thorough, it is essential to use a portable rootkit remover program and a registry cleaner. In order to clean your browser data, boot your PC in safe mode and attempt any manual removal please refer to the removal guide below and download a particular anti-malware tool after manual removal. Also refer to the above mentioned files associated with Google Redirect Virus.

Milena Dimitrova

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the beginning. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share