Click on screenshot to zoom
Danger level 7
Type: Browser Hijackers
Common infection symptoms:
  • Hijacks homepage
  • Changes default search engine

Before even considering using users should firstly learn more details about it, for example, you should be aware of the fact that it was created by an unreliable company called Polarity Technologies Ltd. Also, the new search engine appears to be a clone of,, and other similar browser hijackers. Thus, the application falls under the same category. Such software is often considered as annoying because it might modify browser settings like the default search provider, homepage, or new tab page. The browser hijacker could also be potentially dangerous since it might inject displayed search results with untrustworthy third-party advertising. To avoid these ads and possible redirection to harmful web pages we would advise you to pick a more reliable search engine instead of Since we recommend the application's removal we are adding deletion instructions at the end of this page too; you can find them easily if you slide below the text.

Browser hijackers like are often distributed with doubtful browser extensions or other programs. Another thing our researchers noticed about these applications is that they are sometimes promoted with exaggerated descriptions allowing to think the software could have more features than it has. For instance, this search engine could be advertised as a free PDF converter. However, as it is said in the software’s End User License Agreement, “is a free desktop application that offers you direct links to websites.” In other words, it can only redirect the user to websites with particular tools, but the program itself does not possess them.

Links below the search bar can redirect users to, while the icons below the address bar can lead to web pages providing local weather or other news. Clearly, if you do not care so much about what website should be your homepage or what your default search engine should be, and all these links in one place might seem like a practical option. Nevertheless, you should not forget the search engine is classified as a browser hijacker, and there are some risks to consider. Besides, you can bookmark and other sites on your own without endangering the system.

As we said earlier, it is possible the threat could show you third-party advertisements that are not very reliable, for example, they might advertise other browser hijackers, potentially unwanted programs, adware, and so on. The application’s developers claim they do not take any responsibility for the third-party content in their End User License Agreement, so they probably do not review the ads or try to ensure their reliability in any other way. In such case, we would not be surprised if some of the injected advertisements could be malicious, for example, lead users to websites containing Trojans, viruses, etc. Moreover, some of the ads like pop-ups with fake lottery winnings may disturb your browsing or redirect you to web pages that could try to gather your personal information.

The fact is there could be lots of different situations since can display lots of various ads, and we do not know from where they might originate. Therefore, it is hard to say what part of them could be potentially dangerous. If you do not want to take any risks, we would advise you to remove the suspicious search engine without any hesitation. You can replace it with a more trustworthy tool, for example, or, so there is no need to take any chances.

More experienced users could see the instructions located below and get rid of the browser hijacker manually while following the provided steps. As for less experienced users, we recommend checking the instructions first, if they appear to be too complicated, it might be best to eliminate the threat automatically. Users can do so after installing a reliable antimalware tool. Once the software is ready to use, set it to scan the system and wait for the report. Then you can look at the list of detections or just click the removal button and erase all detected threats at once.

Delete from browsers

Internet Explorer

  1. Press Win+R to open the RUN.
  2. Type Regedit and tap OK.
  3. Navigate to this specific directory: HKCU\Software\Microsoft\Internet Explorer\Main
  4. Pick a value name titled as Start Page, right-click it and press Modify.
  5. Instead of place a website you prefer and click OK.
  6. Look for the same path: HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}
  7. Search for value names called FaviconURL, FaviconURLFallback, TopResultURL, and URL.
  8. Right-click all these files and choose Modify.
  9. Replace their value data and select OK.
  10. Close the Windows Registry.

Mozilla Firefox

  1. Press Win+E to open the Explorer.
  2. Go to the listed path: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\{Unique Mozilla user ID}
  3. Pick a file called Prefs.js and open it with Notepad.
  4. Find this specific line: user_pref(“browser.startup.homepage”, “”).
  5. Instead of place a link to a reliable website.
  6. Press Ctrl+S and exit the document.

Google Chrome

  1. Launch the Explorer (Win+E).
  2. Go to the given location: C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default
  3. Look for files named as Preferences, Secure Preferences, and Web Data.
  4. Right-click them separately and press Delete.
  5. Exit the Explorer.
Download Spyware Removal Tool to Remove*
  • Quick & tested solution for removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.