What is is a questionable search engine that seems to belong to the ELEX family. This family of malware infections mainly contains browser hijackers, including and This search engine does not seem to be active at the moment, which can mean that it will start up anytime. Nevertheless, according to our malware specialists at, this search engine is mostly spreading in India and Iran. But do not think that you cannot get infected with it anywhere else. Since this application may enter your system with malicious companions, there is a good chance that this useless search engine is only a small part of your problems. If you do not want to cause more security-related issues, you should not use this search engine even if this is the page that may come up as your home page or search engine when you go surfing the web. In fact, we suggest that you delete as soon as possible. If you are interested in the potential risks involved and how you can protect your PC from similar attacks, please read on.test

Where does come from?

Our specialists have found that this search engine is promoted through freeware bundles, just like most of its peers. It is possible that you have visited a shady website, most likely torrent, shareware, gaming, or pornographic pages, and you clicked on unsafe content there. This usually means that you click on third-party advertisements that most often do not even look like ads but more like buttons belonging to the site itself. This usually misleads unsuspecting computer users when they end up on unfamiliar websites looking for free content or files to download. This is why we advise you to always use reputable and official websites for downloading software. But before downloading anything, you should also run a quick web search to see that your target is worth installing at all. Such a search could reveal that your desired program or tool is indeed a malware infection of some sort that you should remove ASAP. This may not help you right now because if you are reading this article, chances are your computer has already been infected. Therefore, we recommend that you delete and make sure that you detect and eliminate all other infections as well if you want to use a secure computer.

How does work?

This search engine may show up in all your major browsers, including Mozilla Firefox, Google Chrome, and Internet Explorer, as your home page and default search engine. This way you cannot really avoid contact with it. But we would like to warn you not to engage with any content coming from this search engine even though right now you may not even find it working. It is possible that this tool can gather data about your online activities and preferences so that targeted ads and links can be sent to your screen through the search results. Since it is likely that this search engine will display modified results, you should not trust them at all. It is impossible to distinguish potentially harmful promoted ads and links from normal results. If you click on corrupt content, you may be redirected to fake infected websites that are run by cyber criminals. This could end with more malicious programs on your system or you may even lose your identity or money in an online scam. If you do not wish to experience any of these unfortunate scenarios, you should remove right now.

How do I delete

This search engine might make certain modifications on your system that have to be restored to make sure that no leftovers remain. Therefore, it is important to check your hosts file in the “C:\Windows\System32\drivers\etc” directory. Open it and look for any strings related to “” and delete them all. Then, save the file. It is also possible that this infection modifies your shortcut Target lines. This way even if you reset your browsers, the modified Target lines will always overwrite this and start your browser with this questionable search engine as your home page. That is why you should check and restore the Target lines if need be. Then, you can reset all your browsers. Please use our guide below if you need assistance. If you would like to stop malware infections from infiltrating your PC, you should keep some basic rules of web surfing. For example, do not visit unfamiliar and suspicious websites, do not click on third-party ads, do not click on suspicious links on social networking sites, and do not open questionable e-mails and their attachments. This way you can do a lot for the protection of your system. Also, it is important to keep all your programs and drivers (Java, QuickTime, Flash) updated due to the fact that cyber criminals can exploit older versions’ bugs and security holes.

Restore the Target lines

  1. Right-click on your browser shortcut on your desktop.
  2. Select Properties and choose the General Tab.
  3. Make sure that the Read-only box is unticked.
  4. Select the Shortcut tab.
  5. Restore the Target line to point to your browser and click OK.
  6. Right-click on the shortcut on your Taskbar to display the menu.
  7. Right-click on the browser name option at the bottom.
  8. Repeat steps 2 to 5 to restore the Target line.

Remove from browsers

Google Chrome

  1. Tap Alt+F and go to Settings.
  2. At the bottom, click Show advanced settings.
  3. At the bottom, click Reset settings.
  4. In the pop-up, press Reset.

Internet Explorer

  1. Tap Alt+T and choose Internet Options.
  2. Click on the Advanced tab and press Reset.
  3. Tick the Delete personal settings checkbox.
  4. Press Reset and press Close.

Mozilla Firefox

  1. Tap Alt+H and access Troubleshooting Information.
  2. Press Refresh Firefox and click Refresh Firefox in the pop-up.
  3. Click Finish.
100% FREE spyware scan and
tested removal of*

Leave a Comment

Enter the numbers in the box to the right *