Removal Guide

Do you know what is? looks like a search tool, but it does not act like one, and this is the main reason to delete it from your web browser. According to our research team, when this infection slithers in, it corrupts the homepage to ensure that you see it every time you open your browser. If you continue facing this web browser hijacker, you are more likely to interact with it, and that is not recommended. If you enter search keywords, you will be redirected to a different search engine, where search results are likely to be modified. The hijacker currently redirects to Google Search, which is why many victims are likely to interact with the results shown to them without thinking much about it. That is dangerous because the sponsored content injected by the hijacker could be malicious. Without a doubt, you must remove, and you can learn how to do it by reading this report.

According to the analysis of our research team, comes from the ELEX family, the same family that,,, and many other hijackers belong to as well. These threats are identical, and the only difference is that they have different domain names. Their interfaces are very bare, and they only offer search fields. There are no links routing to external pages, where you could find out more about the hijackers, and there are no widgets or tools. What about the “Images,” “Videos,” and “News” tools represented at the top? These tools do not work, and they are just an illusion. Regardless of which one of these you select, you will end up on the same page with the same results. is believed to modify search results to promote third-party links. It is hard to say whether or not the links injected would be malicious, but since that is possible, you must remove the hijacker as soon as possible. You also should do that to avoid the potential collection of data and other kinds of undesirable Removal screenshot
Scroll down for full removal instructions

Did slither into your operating system on its own? That is unlikely because this hijacker is unlikely to enter systems silently and because it does not stand on its own. If you are offered it, it must be attached to something more attractive. If you are not experienced with malware, you might want to install a malware scanner to inspect the files and programs installed on your PC. If any of them turn out to be malicious, you will be informed about it very quickly. Without a doubt, you must delete all infections found on your operating system. Even if they do not appear to be extremely malicious, you want to eliminate them because they might turn out to be more devious than you think. If you discover multiple infections, you might want to consider using a tool that could automatically delete along with the rest of them.

If you know how to modify the homepage on the browser, you should be able to remove the suspicious hijacker that way. Another option is to modify the browser components on the operating system, which is what you are shown to do in the guide below. As discussed already, you can also install software to have all threats eliminated automatically. This is what anti-malware software is designed to do, and you should really consider this option. Overall, whatever you decide to do, you simply need to make sure that your operating system is completely clean.


Internet Explorer

  1. Simultaneously tap Win+R keys to access RUN.
  2. Enter regedit.exe into the dialog box to access Registry Editor.
  3. Navigate to HKCU\SOFTWARE\Microsoft\Internet Explorer\Main.
  4. Double-click the value named Start Page to open it.
  5. Overwrite the URL of the hijacker with the desired URL and click OK.
  6. Move to HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} and repeat step 5 with these values:
    • FaviconURL
    • FaviconURLFallback
    • TopResultURL
    • URL

Mozilla Firefox

  1. Simultaneously tap Win+E keys to access Windows Explorer.
  2. Enter %AppData%\Mozilla\Firefox\Profiles\ into the bar at the top.
  3. Open the {profile name} folder and then, using a text reader, open the prefs.js file.
  4. Overwrite the URL of the hijacker with the desired URL and save the file.

Google Chrome

  1. Simultaneously tap Win+E keys to access Windows Explorer.
  2. Enter %LocalAppData%\Google\Chrome\User Data\ into the bar at the top.
  3. Open the Default folder (if profiles exist, you will have to open the {profile name} folder instead).
  4. Delete or modify (open the file, overwrite the hijacker’s URL, and save the file) these files:
    • Preferences
    • Secure Preferences
    • Web Data

In non-techie terms:

Have you installed Was it installed without your permission? This does not matter. What matters is that you delete this browser hijacker from your operating system. Our research team recommends removing because it can redirect you without your permission, and because it can showcase sponsored content where you might expect normal search results to be. On top of that, it exploits the reputable Google Search to mask this. Overall, there is no denying that you are better off without it, and so we have a few different options for you when it comes to the removal of this threat. You can follow the instructions above, or you can try modifying the homepage on the browser. The best option, of course, is to install an anti-malware program because it would automatically erase malware while ensuring reputable protection as well.