Click on screenshot to zoom
Danger level 7
Type: Browser Hijackers
Common infection symptoms:
  • Hijacks homepage
  • Changes default search engine

If you are still hesitating to remove, you should read the article and learn more about this application. Despite that you may have installed it accidentally, you might think that the search engine is harmless to your computer. However, our specialists tested the program and learned that it is a browser hijacker. Apparently, the application belongs to a family of browser hijackers that is called ELEX. This means that there are a lot of clones of the program, and they all work in a similar manner. can cause troubles for its users because it might display advertising content from harmful web pages. For example, such sites could contain viruses, ransomware, Trojans, or other threats. If you do not want to risk infecting the system with malware, we advise you to use the removal instructions placed at the end of this article.

How can you be sure that this browser hijacker entered your system? The first sign is suddenly changed default homepage that should be replaced with If you change the homepage through browser settings, but does not disappear, you should check specific files of your browser. For example, if you use Internet Explorer, you should open the Registry Editor, go to the HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main directory, and check the data of a value name called Start Page. If the value data says, there is no doubt that your browser was hijacked. is hosted on one server together with other browser hijackers, such as,,, and many others. Just like other applications from the ELEX family, it might use a legitimate search engine but modify the collected results. Thus, users may think that they are redirected to as they would see the search engine’s site. However, the results could show you content that you would not see while using Google. For instance, it could have injected pop-ups, ads, coupons, or other suspicious content that would belong to the third party.

The program’s End User License Agreement states that the software, its creators or third-party partners are not responsible for any harm, which users could receive while using the search engine or interacting with displayed ads. This could mean that the browser hijacker’s creators promote third-party content without checking if such content is safe for its users. Unfortunately, third-party ads might come from web pages that were designed to distribute malware. For example, a malicious site could offer you to download some updates that would actually install malware on your system. Of course, we cannot be one hundred percent sure that this could happen to you, but there are other risks as well. Sites that belong to the third party should have a different policy on privacy matters. They might not even display Privacy Policy documents, so if you value your privacy, it is better to avoid suspicious third-party content.

As we mentioned at the beginning, the program might be distributed bundled with other unreliable software. In most cases, such bundled applications are downloaded from torrent or other questionable file-sharing web pages. If you occasionally visit such sites yourself, it would be better to avoid them or at least download a trustworthy antimalware tool. The tool could notify you about any software that might be malicious or potentially harmful. Therefore, it would help you to stay away from browser hijackers or any other threats in the future. does not appear to be a reliable search engine; thus we do not encourage users to leave it on their browsers. On the contrary, we would advise users to erase the browser hijacker as soon as possible. The removal instructions placed below will show you how to restore the data that might have been modified by the program. We understand that the instructions could appear to be too difficult for inexperienced users, but in that case, you can always download a trustworthy security tool and use it instead of deleting the browser hijacker manually. Using the antimalware tool can be more beneficial to your system because it can clean it from other possible threats too. If you still need some help with the deletion part, let us know by leaving a comment below or contacting us through social media.


Internet Explorer

  1. Press Win+R, type regedit and select OK.
  2. Find this path: HKCU\Software\Microsoft\Internet Explorer\Main
  3. Locate a Value Name titled as Start Page on the right side of the Registry Editor.
  4. Right-click the Start Page and select Modify.
  5. Replace Value Data with any website that you like, e.g. and click OK.

Mozilla Firefox

  1. Open the Explorer and navigate to C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\{Unique Mozilla user ID}
  2. Find a file called Prefs.js and open it with Notepad.
  3. Locate and delete this line: user_pref(“browser.startup.homepage”, “”).

Google Chrome

  1. Open the Explorer and go to C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default
  2. Find listed files: Preferences, Secure Preferences, Web Data.
  3. Right-click each file separately and press Delete.
Download Spyware Removal Tool to Remove*
  • Quick & tested solution for removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.