Click on screenshot to zoom
Danger level 7
Type: Browser Hijackers
Common infection symptoms:
  • Changes default search engine
  • Hijacks homepage

In this text, we will explain about a browser hijacker known by the name of Its title comes from the search engine that might be placed instead of the user’s default search provider, homepage, or new tab page when this hijacker settles in. Therefore, it might seem as if users are forced to use the presented search engine for browsing the Internet. However, we advise you to stay away from it since our researchers think it could show unreliable results. For instance, they could contain annoying and even possibly malicious third-party advertisements. Plus, it is important to mention was created by an unreliable company known to us as a publisher of browser hijackers. Under such circumstances, it would be advisable not to keep such suspicious application unattended and remove it faster. Luckily, the task is not extremely difficult, and if you take a look at the instructions locate below, you can see it for yourself.

The threat has Privacy Policy and End User License Agreement statements located at the bottom of According to these mentioned documents, the search engine was created by a developer named as Polarity Technologies Ltd. For the last few days we encountered even two new browser hijackers, released by the same company that have very similar titles ( and, so we have no doubt this newest edition to the family of Polarity Technologies Ltd tools is untrustworthy just the same. In fact, besides the two mentioned search engines, we have tested a lot of other browser hijackers with different titles, but also belonging to the same developer, for example,,,, and many more.

Currently, it is known the application could be compatible with Internet Explorer, Mozilla Firefox, and Google Chrome, but there is not much information about its distribution. Researchers who tested this browser hijacker believe it should be spread the same ways its previous versions were, to be more precise, through bundled software installers, suspicious pop-up ads, or browser extensions with similar names. If you recall when appeared on your system, you should more or less know which was the application it was bundled with. Users who wish to avoid similar threats are advised to stay away from file-sharing web pages that offer various freeware and pirated software. Instead of them, it would be best to choose legitimate and reliable websites. Also, always make sure the program you have chosen is developed by a reputable company, has positive reviews, ratings, and so on. Lastly, we recommend using a trustworthy antimalware tool so you could be notified about potential threats. is not an application that settles on the computer by creating and placing files on it. The hijacker is usually visible only in the user’s browser, although in some cases it can be seen on the Control Panel’s list of installed programs if it comes as a browser extension, toolbar, etc. This search engine settles in by modifying your browser preferences, so you would see every time the affected browser is launched, a new tab is opened, etc. What you should be aware of is the possibility the hijacker could modify provided results by injecting them with annoying advertisements from the software’s third-party partners. The worst part is that it is entirely possible such ads or some part of them might be clickable, and they may redirect the user to dangerous web pages. For example, you could land on sites distributing threats alike, containing malware, trying to steal sensitive information, and so on. Thus, we urge you to consider the risks carefully.

If you do not think it would be wise to use for searching the Internet we encourage you to get rid of it with no hesitation. The threat can be erased manually without much effort, although the task could appear to be difficult for inexperienced users. In that case, we would recommend leaving this task to a reliable antimalware tool you prefer. Just click the scanning button and wait for the results to be displayed. Afterward, you should notice a deletion button you can click, press it and the tool will remove the suspicious files and programs it located at once.


Internet Explorer

  1. Tap Win+R.
  2. Type Regedit and click Enter.
  3. Find value name called Start Page in the given path: HKCU\Software\Microsoft\Internet Explorer\Main
  4. Right-Click Start Page and choose Modify.
  5. Instead of insert a page you prefer, e.g.,
  6. Click OK.

Mozilla Firefox

  1. Press Win+E.
  2. Look for a file named Prefs.js in the provided path: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\{Unique Mozilla user ID}
  3. Launch Prefs.js with Notepad.
  4. Replace with a site you like in the following line: user_pref("browser.startup.homepage", " ").
  5. Save the changes (Ctrl+S).
  6. Close Prefs.js.

Google Chrome

  1. Press Win+E.
  2. Search for files named Preferences, Secure Preferences, and Web Data in the given path: C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default
  3. Right-click them separately and select Delete.
  4. Close the Explorer.
Download Spyware Removal Tool to Remove*
  • Quick & tested solution for removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.