Remove “Funnysearching”, “Myluckysites”, “Ourstartpage” Browser Hijackers

All four domains (, belong to the same browser hijacker family. They hijack the default homepage and start displaying a website with a fake search field, current time and a changing background photo.

While the websites look better than most similar ones created by adware companies, they still do not have any value and are only parasites designed to earn money from your browsing activity.

The search queries are redirected to third party providers (usually Google search) and the creators earn commissions every time you click on a sponsored result. Also, the website includes affiliate links and might use other monetization methods like cookie stuffing and unwanted redirects. Finally, the websites might lead to more infections if you install their recommended addons or software or get redirected to suspicious links.

You should remove this browser hijacker as soon as possible in order to protect your privacy, increase speed and restore normal browsing experience. We have an automatic malware removal and protection tool which will not only eliminate the threat but also secure your computer in the future. We also have a manual guide, however, you are still strongly recommended to install protection afterwards if you choose this option.

Recommended Method: Download Browser Hijacker Removal Tool

No widget block selected.

Version:   All Updated:   2 days ago Compatible OS:   All
This is the most suitable program for automatically removing the threat and repairing your PC.
Works with: Windows 10, Windows 8, Windows 7, Windows Vista, Windows XP. Read instructions here
File name Size
mb3-setup.exe 56.5 MB

Click here to download alternative tool

What are browser search hijackers?

These hijackers, like most similar malware, replace the default homepage with their own websites. They also modify browser settings and change default search provider. This results in unwanted pages loading every time you use your browser and brings traffic to the creators. They usually monetize it by displaying advertisements, partner links and suggesting other software.

This particular hijacker is currently known to use at least four domains:

All websites look almost identical. They all have a search field, a greeting, time, date and some links at the bottom. A background image is displayed and changes each day. Here are all possible greetings, displayed depending on the time of the day:

Good morning! Nice to meet you.
Feeling hungry? Take it easy, it'll be lunchtime soon!
Good afternoon! How's your day going?
Hi! How about taking a rest and having a cup of tea ?
Good evening. Hope you've had a productive day so far!
The day is winding down. Hope you had a good one!
Long night ahead? We're always here.

While the design looks quite sophisticated there is actually no value in the website. Instead, the search functionality is fake as it simply redirects to other providers and earns money to the hijacker creators. Therefore, this hijacker is an unwanted parasite on your system which only slows down your system and possibly collects personal data.

The hijacker is quite popular. For example, receives over 60 000 daily pageviews and seems to be very profitable to its creators. This means that they are motivated to infect even more computers and that the current victims do not know how to remove the adware. The other sites receive less traffic as they have probably been just created and will be growing soon.

Browser hijackers, adware and other unwanted programs usually infiltrate computers by coming bundlled with other software. When you install a freeware and skip through installation steps you might accidentally click “Accept” on additional offer and end up infecting your computer. While technically this is a legal way of software distribution, most users are unaware of this method and fall victims to it. Once the adware enters your system it becomes much harder to remove as it places backup files and often performing a regular uninstall procedure fails.

The biggest risk of having a browser hijacker on your computer is that it can track your personal data. All your searches go through a suspicious server and unwanted browser extensions can spy on you as well. This, together with decreased speed and unwanted advertisements, should motivate you to remove the adware as soon as possible and avoid more problems in the future.

We have a manual removal guide for more experienced users. However, we recommend using the automatic tool as it will not only remove the threat but also protect your computer in the future.

Here are some screenshots of the browser hijacker:


 Manual Removal Instructions:

NB: Make sure you are familiar with editing important Windows settings and files. In order to not only remove the symptoms but also any possible leftovers of the adware we recommend using the automatic tool provided above.

Bookmark this page, print it out or simply open on another device in order to access it after a browser or computer restart which will be required during the removal process.

Step 1:

Remove any suspicious programs that might contain the adware.

Start by opening the Programs and Features window using the following method:

Hold Windows () key and click R key while holding.

Enter the following in the field:


Click OK.

You might have to wait a bit before the list of all programs is loaded as it displays a list of all programs installed on your PC.

We recommend sorting the programs by “Installed On” column (simply click on the column name in order to sort by this value).

Look for any recently installed suspicious programs that might contain the adware as a bundle or could be the adware itself. If you have never seen or used an app chances are that it is an unwanted software.


Uninstall all suspicious programs by right-clicking on them and choosing Uninstall…

Repeat this process until no more suspicious programs are left.

Step 2:

Delete registry values created by this adware.

Press and hold Windows () key and click R key.

Enter the following in the field:


Click OK.


Search for virus entries by pressing keyboard buttons CTRL + F and entering the virus domain. You will have to enter the domain depending on the version you have installed. Here is an example:

Click Find Next.

Delete any registry entries associated with the virus.

Repeat the search until all entries are cleaned.

Step 3:

Clean up Windows temporary files.

You can safely remove all temporary files without posing any risk to your computer.

Hold Windows () key and click R key.

Enter the following in the field:


Click OK.

All temporary files will be listed in the directory.

Select all temporary files by simultaneously pressing CTRL + A and delete them.

Step 4:

Remove suspicious programs from your startup config so they would not launch as soon as you boot your computer.

Hold Windows () key and click R key.

Enter the following in the field:


Click OK.

Go to the Startup tab and uncheck all suspicious entries.

You will see locations of the files in “Command” column. Navigate to the location and delete it if a suspicious file is found.

If you are unsure you can simply leave it unselected but not delete it.

Click OK when you are finished unselecting and deleting all potentially dangerous processes.

Step 5:

Delete the shortcuts for all browsers on your computer as they might have been changed by the hijacker.

Remember that there are shortcuts not only on your Desktop but also in other places (for example, Start Menu).

Then create them again in order to have clean browser start.

Alternatively, you can click Properties on each of the shortcuts and remove any additions made to the Target field by the adware.

Step 6:

IMPORTANT: Now you will have to reset browser settings for each browser individually that you have installed on your computer. Alternativelly, you could simply reinstall them.

The unwanted addons are usually named similarly to the program you have just uninstalled using Add or Remove Programs.

 Google Chrome:

Launch the browser and select More Tools, then click Extensions.

Check for any suspicious extensions.

Click Remove From Chrome for each unwanted or suspicious toolbar or extension (the trashcan icon on the right).

Go to Settings.

Scroll to the very bottom of the settings page and click Show advanced settings…

Scroll to the very bottom again and click Reset settings.

Click Reset.

 Mozilla Firefox:

Launch the browser and go to Add-ons.

Search for any suspicious toolbars and add-ons and Remove them.

We recommend going to Options (input about:preferences in your address field and press Enter) and clicking Restore to Default near the Home Page field.

You can also completely refresh the browser settings by entering the following in the address (URL) field:


Press Enter.

Click Refresh Firefox… and then click Refresh Firefox again.

 Microsoft Edge:

Since Microsoft Edge is not a separate program and is a core component of Windows 10 you should backup your computer or at least create a Restore Point before continuing.

Navigate to the following folder (where %username is your computer user name):


Clear all contents of the folder. Click CTRL + A to select everything and delete the contents.

Click Start (Windows logo).

Search for Windows PowerShell.

Right-click on the result.

Choose Run as administrator.

Paste the following command:

Get-AppXPackage -AllUsers -Name Microsoft.MicrosoftEdge | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register $($_.InstallLocation)\AppXManifest.xml -Verbose}

Press Enter.

The settings should now be reset to default.

 Internet Explorer:

Press and hold Windows () key and click R key.

Enter the following in the field:


Click OK.

Enter the following command in the appeared window:

RunDll32.exe InetCpl.cpl,ResetIEtoDefaults

Press Enter.

Check Delete personal settings.

Click Reset.

Alternatively you can run this command to delete all caches and settings:

RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 4351

After removing the virus

When you have finished removing the homepage search adware and reverting your browser settings make sure to protect your computer by installing a good antivirus suite that would identify the threats online and in programs you have downloaded. Also, never install suspicious programs. If you are installing a new software, make sure it has nothing bundled in it by following the install wizard as well as searching for user reviews online.

Leave a Reply

Your email address will not be published. Required fields are marked *

Begin typing your search above and press return to search. Press Esc to cancel.