How to Remove (Chrome/Edge/Firefox) | Updated

I wrote this article to help you remove This removal guide works for Chrome, Firefox and Internet Explorer. looks like a regular search provider at first glance. The site offers keyword search and filters for images, videos and maps. An unusual trait about the site is that it features a couple of search fields on the top and bottom of the page instead of a single field in the middle. Other than that, the website gives no indication of anything wrong. This is not how things are in reality. There are security risks around the website. is used by browser hijackers. Once such a program sneaks into your system, it will make this site your homepage and default search provider. The hijacker will change your search results to include supported websites. It will also generate pop-up ads, advertising various kinds of items at bargain prices. These sites can be corrupted and lead to malware infections. The hijacker will also keep track of your browsing history and collect information from your keystrokes. It can gather various kinds of data on you, like your search terms, IP address, geographic coordinates, demographic details and the entries into your personal accounts. The people behind the clandestine program will sell your data without your knowledge or permission.

Many users are puzzled as to how got set to be their homepage and default search engine. If this is the first time you encountered a hijacker, you may not know that these programs can penetrate your browser and change your settings. You may not know how they are distributed to begin with. The first thing you need to know is that you do not get infected with them by visiting the website they are associated to. The truth is they only start using a site as a portal to your system once they have already made their way in. These malevolent programs use other software to make their way into your system. In most cases, freeware is utilized.

The hijacker comes merged with a freeware program in its setup file. The unwanted program will be offered along the installation process as an additional tool you can install for free with the main software. You have to read the agreement carefully to see there is an extra tool offered for install. For some reason, users tend to believe the installation agreement is redundant and omit to read it. All kinds of malware can enter this way, like potentially unwanted programs, adware, fake AV programs, ransomware and Trojans. It is highly advised to play it safe.

The hijacker that uses the website for its agenda can penetrate and change the settings of the most widely used internet browsers: Google Chrome, Mozilla Firefox and Internet Explorer. The website has a malicious code that allows the hijacker to alter your search results and collect information from your browser. The malicious program will place supported websites amid the regular results to your queries. It will also generate advertisements in the forms of pop-up, full-page and pop-under windows, banners, coupon boxes, in-text, transitional, contextual, inline, floating and interstitial ads. The ads will offer various products at bargain prices to attract your attention and get you interested.

The people behind the hijacker make proceeds mainly by having people follow supported links. However, they do not take responsibility for your safety. The terms of service (TOS) are not in the user’s favor. It is stated that you are not entitled to seek compensation for any security issues you have come across by using the website’s services. The entity behind is simply referred to as Live Start Page.

Doing further research, we were able to identify the company which owns the website as Earthmagic Technology Ltd. It is headquartered in Mongkok, Hong Kong. Apart from showing you questionable ads, the hijacker will also collect data on you, such as your browsing history, IP address, e-mail, location, user names and passwords. Your information will be sold to undisclosed third parties who may have an agenda.

You have to locate and uninstall the program behind to restore your system’s security. There is a guide below to help you with the manual removal. After you are done, you should run a scan of your computer with an AV tool to check if other unwanted software was able to enter. The hijacker behind can open security holes in your system by making registry entries. Uninstall

STEP-1 Before starting the real removal process, you must reboot in Safe Mode. If you are familiar with this task, skip the instructions below and proceed to Step 2. If you do not know how to do it, here is how to reboot in Safe mode:

For Windows 98, XP, Millenium and 7:
Reboot your computer. When the first screen of information appears, start repeatedly pressing F8 key. Then choose Safe Mode With Networking from the options.
Safe Mode with Networking
For Windows 8/8.1
Click the Start button, next click Control Panel —> System and Security —> Administrative Tools —> System Configuration.‌
Windows 8 Safe Mode with Network
Check the Safe Boot option and click OK. Click Restart when asked.
For Windows 10
Open the Start menu and click or tap on the Power button.
win10 safemode 1
While keeping the Shift key pressed, click or tap on Restart.
win10 safemode 2

STEP-2Here are the steps you must perform to remove the hijacker from the browser:

Remove From Mozilla Firefox:

Open Firefox, click on top-right corner , click Add-ons, hit Extensions next.
firefox extensions
Look for suspicious or unknown extensions, remove them all.

Remove From Chrome:

Open Chrome, click chrome menu icon at the top-right corner —>More Tools —> Extensions. There, identify the malware and select chrome-trash-icon(Remove).
chrome extensions

Remove From Internet Explorer:
Open IE, then click IE gear icon on the top-right corner —> Manage Add-ons.
ie gear
Find the malicious add-on. Remove it by pressing Disable.


Right click on the browser’s shortcut, then click Properties. Remove everything after the .exe” in the Target box.

ff shortcut


Open Control Panel by holding the Win Key and R together. Write appwiz.cpl in the field, then click OK.


Here, find any program you had no intention to install and uninstall it.


Run the Task Manager by right clicking on the Taskbar and choosing Start Task Manager.

task manager

Look carefully at the file names and descriptions of the running processes. If you find any suspicious one, search on Google for its name, or contact me directly to identify it. If you find a malware process, right-click on it and choose End task.


Open MS Config by holding the Win Key and R together. Type msconfig and hit Enter.


Go in the Startup tab and Uncheck entries that have “Unknown” as Manufacturer.

Still can not remove from your browser? Please, leave a comment below, describing what steps you performed. I will answer promptly.

Leave a Comment

Your email address will not be published.

Time limit is exhausted. Please reload CAPTCHA.