What is And how does it work? is a browser hijacker that stealthily infiltrates your computer. It replaces your home page and search engine once it infects your computer. Although it does not directly damage your computer, this browser hijacker however, can be a way for other severe infections to get in your computer such as Trojans, ransomware, etc.
At first glance, looks like a legitimate search engine that offers several features like quick links to social media pages, media services, gaming sites and more compared to other popular search providers. No wonder most users fell for its appearance, not knowing that this search engine can monitor their browsing activities to gather personal information. The information gathered is based on your browsing activities.
How is distributed? spreads through repackaged software bundles along with other freeware or shareware programs. Even if the unwanted programs can be easily disclosed, most users don’t know how to do it or they just don’t bother doing it so they end up with an unwanted program in their computer.
The removal instructions below will help you remove
Google Chrome

  1. Tap Win + E to open File Explorer.
  2. Navigate to this path:%LocalAppData%\Google\Chrome\User Data\Default
  3. Remove Preferences, Secure Preferences and Web Data
  4. After that, empty the Recycle Bin.

Mozilla Firefox

  1. Tap Win + E to open File Explorer.
  2. Navigate to this path:

“%AppData%\Mozilla\Firefox\Profiles\{Unique Mozilla user ID}

  1. After that, open js with Notepad.
  2. Change the user_pref(“browser.startup.homepage”, “”) with your preferred web address.

The next step for Internet Explorer below is not recommended for you if you don’t know how to navigate the Registry Editor. Making registry changes can highly impact your computer. So it is highly advised to use PC Cleaner Pro instead to get rid of the entries that created. So if you are not familiar with the Windows Registry skip to the advanced steps onwards.

However, if you are well-versed in making registry adjustments, then you can proceed.
Internet Explorer

  1. Press Win + R to open Run.
  2. Type in regedit and click OK to open the Registry Editor.
  3. Change the value data of in the following registry keys:
  • HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main\Start Page (64-bit!)
  • HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page
  • HKCU\Software\Microsoft\Internet Explorer\Main\Start Page
  1. Navigate to the following path and change the value names in HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}
  • FaviconURL (value data: “”)
  • FaviconURLFallback (value data: “”)
  • TopResultURL (value data: “”)
  • URL (value data: “”)
  1. Close the Registry Editor.

Follow the continued advanced steps below to ensure the removal of
Perform a full system scan using SpyRemover Pro.

  1. Turn on your computer. If it’s already on, you have to reboot
  2. After that, the BIOS screen will be displayed, but if Windows pops up instead, reboot your computer and try again. Once you’re on the BIOS screen, repeat pressing F8, by doing so the Advanced Option shows up.

  1. To navigate the Advanced Option use the arrow keys and select Safe Mode with Networking then hit
  2. Windows will now load the Safe Mode with Networking.
  3. Press and hold both R key and Windows key.

  1. If done correctly, the Windows Run Box will show up.
  2. Type in explorer

A single space must be in between explorer and http. Click OK.

  1. A dialog box will be displayed by Internet Explorer. Click Run to begin downloading SpyRemover Pro. Installation will start automatically once download is done.

  1. Click OK to launch SpyRemover Pro.
  2. Run SpyRemover Pro and perform a full system scan.

  1. After all the infections are identified, click REMOVE ALL.

  1. Register SpyRemover Pro to protect your computer from future threats.


logo main menu

Copyright © 2024, FixMyPcFree. All Rights Reserved Trademarks: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: is not affiliated with Microsoft, nor claim direct affiliation. The information on this page is provided for information purposes only. Protection Status

Log in with your credentials

Forgot your details?