Click on screenshot to zoom
Danger level 7
Type: Browser Hijackers
Common infection symptoms:
  • Hijacks homepage
  • Changes default search engine

A browser hijacker that goes by the name of is yet another installment of an infamous ELEX family, which is notorious for producing other hijackers such as,, and The dubious program in question just like all of its mentioned counterparts must be removed as soon as it found up and running on your personal computer. It is crucial to do so since the hijacker in question is only capable of making your online experience virtually intolerable as it makes invasive and unwanted changes to your browser's default settings. In some instances, this hijacker could even prove to be the main reason other devious and potentially harmful applications might be able to enter your operating system without a lot of trouble. Do not take any chances with and conduct its complete removal by following the detailed instructions that we present below our report.

Since is a development of a notorious group that our research team is quite familiar with, so it is not that surprising that it works in a rather similar manner as its counterparts. Upon intrusion, this hijacker immediately alters some of the files and registry entries associated with default settings of major web browsers such as Internet Explorer, Google Chrome, and Mozilla Firefox. Once these modifications are executed you will noticed a sudden change of your default homepage. Such unwanted and unauthorized alteration will aggravate your daily online experience, to put it lightly. For instance, you will no longer be able to start your web browsing session on a homepage that you are used to; instead, you will be forced to start each session on a suspicious third-party web page, whether you like it or not. This is much more annoying that you might think at first. Unfortunately, this is not the worst thing about this particular modification. During our research, it has been discovered that in some instances using the search box presented within the newly appointed homepage could prove to be quite dangerous. This is so because you might be presented with modified search results that might be implemented with redirect links; meaning, that by clicking on a seemingly relevant search result, you could, in fact, end up on a suspicious third-party site hosting malware. Even though such search results are not an often occurrence, coming across one remains a possibility that could have detrimental outcomes, to say the least. Do not waste time and remove as soon as possible as it is just as dangerous as it is annoying.

If you consider yourself a security-conscious user, make sure to take a few precautionary steps to improve your overall virtual security. Since it is well-known that is often distributed via bundled installers, we highly recommend refraining yourself from all suspicious third-party download websites as they are notorious for being the primary source of dubious setup files. You can greatly reduce the risk of infecting your personal computer via a software bundle by simply obtaining all of your applications from authentic vendors' websites since they can be trusted to provide clean setup files. Furthermore, we highly advise you to learn as much as you can about a program that you want to have before even acquiring it. It is critical to do so since malware developers often use devious marketing techniques to trick unsuspecting Internet users into downloading their intrusive piece of software. Last, but not least we advise you to acquire a professional antimalware tool if you do not have one active on your PC already. Such a tool is paramount to your overall virtual security because it can identify and terminate any threatening programs in an automated manner. Take these simple preventative steps, and you will be able to keep your operating system safe and secure at all times.

It should be self-evident that a complete removal of is a must. Do not skip any steps of the removal guide as it could have undesirable outcomes. For instance, leftovers of this browser hijacker could be used to silently restore it. In other situations, traces of could also be more than enough for it to continue its devious functionality. Make sure to avoid finding yourself in such a situation by simply analyzing your operating system for this dubious program's leftovers. Such analysis must be executed as soon as you are done with the procedure of manual removal.

How to remove from your computer

  1. Open File Explorer.
  2. Go to C:\Users\[your username]\AppData\Local\Google\Chrome\User Data\Default.
  3. Select and remove files that are named Preferences, Secure Preferences, and Web Data.
  4. Navigate to C:\Users\[your username]\AppData\Roaming\Mozilla\Firefox\Profiles\[unique Mozilla profile ID].
  5. Find and delete a file called prefs.js.
  6. Click the Windows button.
  7. Type regedit into a search box and then tap the Enter key.
  8. Go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main.
  9. Right-click a registry value entitled Start Page and select Modify.
  10. Replace the unwanted URL with a new one and then click OK.
  11. Go to HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.
  12. Modify the unwanted URL's within the following registry values:
    a) FaviconURL.
    b) FaviconURLFallback.
    c) TopResultURL.
    d) URL.
Download Spyware Removal Tool to Remove*
  • Quick & tested solution for removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.