What is

The interface of indicates that it is a search engine; however, as you enter search keywords, you quickly realize that it does not produce results. Instead, it reroutes you to a different search engine to show you the information you are interested in, as well as sponsored links. malware researchers have found that this “search provider” might use a third-party search engine to showcase advertisements. The search engine exploited for that is Yahoo Search, and, undoubtedly, many users will not even realize that sponsored links are included. In the meantime, the creator of the misleading search tool earns money. In general, this search results-providing tool is unlikely to have been developed to help you. It is more likely that it was created to assist advertisers and promote third-party content. Sure, part of it is harmless (e.g., quick-access links to legitimate sites). All in all, we recommend deleting from your browsers, and you can learn more about this by reading the report.test

How does work? belongs to the family of hijackers that includes, and hijackers. Even the interfaces of these threats are identical. That is because all of them are linked to the same company, Imali Media. This company produces browser extensions that fully represent hijackers. Normally, extensions offer services, additional tools, but Imali extensions were created solely for the representation of the hijackers. Because, in most cases, users expect something else and because they are misled, we classify the search tools/extensions as browser hijackers. Just like with the SaferBrowser family hijackers, these ones are also mainly distributed by malicious advertising-supported programs, as well as software packages. Unfortunately, malicious installers could be used to spread, because of what this hijacker could enter your operating system along with malware. If you have a suspicion that malicious infections exist, you might have scanned your PC already. If you think that you are safe, think about invisible threats. Finding secretive threats manually can be challenging, but a reliable malware scanner will identify the threats that require removal in no time.

The suspicious uses a server,, to redirect your search queries to Because of that, the results shown to you might be modified. As mentioned previously, this threat has a very convincing interface, and Yahoo Search is a reputable search provider. Due to that, you might have interacted with the search results shown already. If you have, think if you are safe. Maybe you interacted with a survey and you shared personal information? Maybe you downloaded unfamiliar software? Whatever the case might be, act appropriately according to your actions. For example, if you have disclosed your email address, you might have to beware of misleading spam emails. It should be obvious by now that this browser hijacker is not all threat great. Sure, it presents legitimate links to Gmail, Facebook, Instagram, Netflix, RottenTomatoes, and various other websites, but that is not something you should focus on when the main feature of the hijacker is to promote suspicious sponsored links.

How to delete

The only question left is how to remove This hijacker is not all that complex, and you should be able to get rid of it by deleting the FunkyTVTabs extensions from Firefox and Chrome browsers. Internet Explorer users might need to uninstall an app. If all fails, you can try using the guide below. It shows how to modify homepage settings by modifying files and registry values. Although this might seem like a complicated task, the steps are quite easy to follow. Also, if you face any difficulties and problems, you can always start a discussion below. Of course, manual removal is not your only option. In fact, it is not even your best option. We believe that all users should use anti-malware software. If you install this software, you will not experience the invasion of malicious threats in the future, and all currently active threats will be erased automatically. Needless to say, if you install fake or outdated software, you will have more problems. So, make sure you install trusted, legitimate, and efficient anti-malware software.

Removal Instructions

Mozilla Firefox:

  1. Launch Explorer by simultaneously tapping Win+E keys.
  2. Type %APPDATA%\Mozilla\Firefox\Profiles\ into the address bar and tap Enter.
  3. Open the {Unique Mozilla Firefox user ID} folder.
  4. Open the file called prefs.js using Notepad.
  5. Erase the hijacker’s URL and enter the preferred URL instead. Save the file.

Google Chrome:

  1. Launch Explorer by simultaneously tapping Win+E keys.
  2. Type %LOCALAPPDATA%\Google\Chrome\User Data\ (or %UserProfile%\Local Settings\Application Data\Google\Chrome\User Data\) into the address bar and tap Enter.
  3. Open the Preferences file using Notepad.
  4. Erase the hijacker’s URL and enter the preferred URL instead. Save the file.
  5. Modify the Secure Preferences and Web Data files in the same way.

Internet Explorer:

  1. Launch RUN by simultaneously tapping Win+R keys and enter regedit.exe.
  2. In the Registry Editor navigate toHKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main.
  3. Right-click the value called Start Page and choose Modify.
  4. Erase the hijacker’s URL and enter the preferred URL instead. Click OK.
100% FREE spyware scan and
tested removal of*

Leave a Comment

Enter the numbers in the box to the right *