What is is a questionable search website that may show up in your browsers and you may not even this realize since it looks like a legitimate search page. But our malware specialists at say that this is just a new ELEX family browser hijacker that gives home to dozens of similar and identical threats, including,, and This hijacker can show up as your new home page in all the major browsers, such as Mozilla Firefox, Google Chrome, and Internet Explorer. Since you cannot trust the results this search engine shows you, we do not recommend that you use it at all. In fact, we advise you to remove as soon as possible because otherwise you could be exposed to unreliable third-party content.test

Where does come from?

Such a browser hijacker mostly spreads via questionable channels. You may install it directly by clicking on an unsafe third-party pop-up ad claiming that you need to update your software, for example. But you can also let it on board directly when clicking on a link on a search results page generated by a browser hijacker or a questionable search website. As a matter of fact, it is possible that this is not the first time you have infected your computer with malware. So you may find adware programs or browser hijackers hiding on your system. These infections can display unreliable ads and links which can either redirect you to malicious pages or directly infect you with this hijacker or a whole bundle of threats.

Obviously, it is the worse case when you download a package of malware infections instead of simply installing this hijacker. However, one click on the wrong content does have its price. It is possible that you are viewing a questionable file-sharing website (torrent or freeware) in an attempt to download a file for free, which could be a book, some music, a movie, or software. If you are not familiar with this page, you may click on content that does not even belong directly to the page but indeed comes from a third party. When you use a suspicious website to download files, you can be sure that you will not download a standalone installer but rather a bundle that could contain a number of malicious threats. There are several types of malware programs that is mainly spread in bundles, including adware programs, browser hijackers, fake alerts, Trojans, and even potentially unwanted programs. If you infect your computer with such a package, you need to run a trustworthy online malware scanner after you delete Once you know what else may be threatening your system, you need to tackle the problem right away because the longer you keep such programs on board, the more exposure you may have to harmful web content.

How does work?

This browser hijacker looks like a professional and reputable search engine. Actually, you may not even realize that it changes your homepage settings and it comes up every time you launch your browsers. This hijacker does not offer you all kinds of quick links and features. You can choose at the top whether you want to search the Web, Images, Videos, or News, and you can also change the language settings in the bottom-right corner, but nothing fancy. Unfortunately, our malware specialists have found that you cannot trust the results this search engine shows you.

In fact, this browser hijacker forwards your keywords to a modified Yahoo search results page. In other words, this page may contain content that is not necessarily reliable even though you are on a reputable search engine’s results page. This can be very misleading and users may not even think that it could be risky to click on any content there. But it is indeed since cyber criminals can take advantage of such hijackers and promote their fake and malicious websites under cover. If you click on any content coming from crooks, you may drop more serious infections onto your system, including Trojans and ransomware programs, but you can also be redirected to malicious websites where you could be scammed to disclose personal information. This is one of the main ways for criminals to steal your money from your bank accounts or to commit online fraud in your name. Although these may be extreme scenarios, we recommend that you remove from your system for your own safety.

How to delete

We have prepared the necessary steps for you below this article. If you follow our instructions carefully, you can quickly eliminate this threat source from all affected browsers. You can also reset your browsers if you do not want manual removal but remember that resetting will remove your preferences and the extensions you may have installed. In order to protect your system better, we suggest that you keep all your programs and drivers updated. However, if you do not feel that you can keep your computer clean, we suggest that you use a professional anti-malware program, such as SpyHunter.

Remove from your browsers


  1. Press Win+E to open File Explorer.
  2. Locate the "C:\Users\{username}\AppData" folder.
  3. Navigate to the "Local\Google\Chrome\User Data\Default" folder.
  4. Delete the Preferences, Secure Preferences, and Web Data files.


  1. Press Win+E to open File Explorer.
  2. Find the "C:\Users\{username}\AppData" folder.
  3. Go to the "Roaming\Mozilla\Firefox\Profiles\[Mozilla User ID]" folder.
  4. Open the "prefs.js" file with Notepad.
  5. Overwrite this string: user_pref("browser.startup.homepage", "");.
  6. Save changes and close the file.

Internet Explorer

  1. Press Win+R and enter regedit. Press OK.
  2. Navigate to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page registry key.
  3. Modify the value data to a preferred homepage.
  4. Exit the editor. 100% FREE spyware scan and
    tested removal of*

Leave a Comment

Enter the numbers in the box to the right *