“Sleek, intuitive, and powerful search engine” Hijacker Removal Guide

Sleek, intuitive, and powerful search engine for everyone” is a newly appeared browser hijacker. It replaces the default homepage with a fake search engine and has many variations. Some of the domains used are searchjungle.com, zeekbee.com, thesearchweb.net, webisearch.com and many more (scroll down for a complete list).

Most of these websites were made using the same template and very offhandedly. Default texts and placeholders like “Here comes your ToS info…” are littered across the pages. Some functions do not work and mostly only the website titles are changed while everything else including colors, texts and general layout are the same.

These search engines actually display search results from other providers and do not have this functionality themselves. Therefore, they only act as parasites and can spy on your browsing activity without giving any additional value. You should remove these threats in case your browsers started opening unwanted homepages every time you launch them.

We have an automatic removal tool listed below which should detect the virus, eliminate the source of it and also protect your computer from any infections in the future. We have also prepared a manual guide for more experienced Windows users.


Recommended Method: Download Browser Hijacker Removal Tool

Version:   All Updated:   2 days ago Compatible OS:   All
This is the most suitable program for automatically removing the threat and repairing your PC.
Works with: Windows 10, Windows 8, Windows 7, Windows Vista, Windows XP. Read instructions here
File name Size
mb3-setup.exe 56.5 MB

Click here to download alternative tool

What is “Sleek, intuitive, and powerful search” hijacker?

This browser hijacker is designed to infect computers, change default browser settings and infiltrate as a homepage. Whenever a user launches his browser a fake search page opens. Trying to change it to another URL usually fails as the virus tends to come back by utilizing its backup files hidden deeply in the system. This way the adware manages to stay unremoved and generate traffic to its websites and earn from advertisements, affiliate links and other means.

Unlike many other such unwanted adware, this one seems to be made very offhandedly. Default placeholder texts are not changed and some of the websites look poorly. The search website immediately draws suspicion and even an inexperienced user would understand that his browser was hijacker. For example, this text showcasing template functions is left in which is dedicated to developer and was supposed to be edited as it does not make any sense for the visitor:

Did you know?
That you can write what ever you want here, even html bolded, or italic if you like it more... :)

One interesting thing is that this virus has many similar websites. We have discovered more than 20 websites which use the same default “sleek, intuitive, and powerful search engine for everyone” slogan:

4viv.com
astelecom.in
e.palgt.com
eidox.de
ejm-search.com
g-search.ga
gwaye.com
izoom.co
massbook.net
myezsearch.com
olllle.com
plusscom.info
prosearch.xyz
purplesearch.com
searchjungle.com
shema.ir
socialopener.xyz
sukamu.com
tarayin.com
thesearchweb.net
urmarel.ro
webisearch.com
wish3s.com
zeekbee.com

Adware usually infiltrates your PC when you install a freeware downloaded from various file directory sites. Many programs are bundled together with the free legitimate software. If a user skips through installation steps without reading terms and conditions or accidentally clicks “Accept” on promotional offers, other software gets installed unknowingly.

You should remove this fake search website from your browsers in order to protect your privacy and prevent any further infections. We have an automatic removal tool listed at the beginning of this article which will also act as an antivirus in the future. We also have a manual removal guide for more experienced users. However, we still strongly recommend securing your machine even if you successfully remove the symptoms.

Screenshots of websites belonging to this adware family:

     


 Manual Removal Instructions:

NB: Make sure you are familiar with editing important Windows settings and files. In order to not only remove the symptoms but also any possible leftovers of the malware we recommend using the automatic tool provided above.

Bookmark this page, print it out or simply open on another device in order to access it after a browser or computer restart which will be required during the removal process.

Step 1:

Remove any suspicious programs that might contain the adware.

Start by opening the Programs and Features window using the following method:

Hold Windows () key and click R key while holding.

Enter the following in the field:

appwiz.cpl

Click OK.

You might have to wait a bit before the list of all programs is loaded as it displays a list of all programs installed on your PC.

We recommend sorting the programs by “Installed On” column (simply click on the column name in order to sort by this value).

Look for any recently installed suspicious programs that might contain the adware as a bundle or could be the adware itself. If you have never seen or used an app chances are that it is an unwanted software.

Uninstall all suspicious programs by right-clicking on them and choosing Uninstall…

Repeat this process until no more suspicious programs are left.

Step 2:

Delete registry values created by this adware.

Press and hold Windows () key and click R key.

Enter the following in the field:

regedit.exe

Click OK.

 

Search for virus entries by pressing keyboard buttons CTRL + F and entering the virus domain. You need to enter the virus name depending on the version you got installed. Here is an example:

searchjungle

Click Find Next.

Delete any registry entries associated with the virus.

Repeat the search until all entries are cleaned.

Step 3:

Clean up Windows temporary files.

You can safely remove all temporary files without posing any risk to your computer.

Hold Windows () key and click R key.

Enter the following in the field:

%Temp%

Click OK.

All temporary files will be listed in the directory.

Select all temporary files by simultaneously pressing CTRL + A and delete them.

Step 4:

Delete the shortcuts for all browsers on your computer as they might have been changed by the virus.

Remember that there are shortcuts not only on your Desktop but also in other places (for example, Start Menu).

Then create them again in order to have clean browser start.

Alternatively, you can click Properties on each of the shortcuts and remove any additions (usually a link to http://launchpage.org) made to the Target field by the virus.

Step 5:

Clean up your DNS.

Press and hold Windows () key and click R key.

Enter the following in the field:

ncpa.cpl

Click OK.

It will open your current network adapters list.

Right-click on the one you currently use (unused usually have a red X near them while the active one is usually green).

Choose Properties.

Click on Internet Protocol Version 4 (ICP/IP) (make sure the checkbox is checked near it).

Click Properties.

First, select Obtain DNS server automatically.

Then click Advanced… and go to DNS tab in the newly opened window.

Remove everything from the DNS server addresses, in order of use.

Step 6:

Restore your system settings to the ones before the infection happened.

Sometimes you might not have restore points or they might be too old so this step might be unsuccessful.

Press and hold Windows () key and click R key.

Enter the following in the field:

rstrui.exe

Click OK.

A System Restore wizard will open.

Click Next.

Check Show more restore points.

If you see any restore points, restore the system. Make sure you select a point that has been created before the hijacker infiltrated your system.

Step 7:

IMPORTANT: Now you will have to reset browser settings for each browser individually that you have installed on your computer. Alternativelly, you could simply reinstall them.

 Google Chrome:

Launch the browser and select More Tools, then click Extensions.

Check for any suspicious extensions.

Click Remove From Chrome for each unwanted or suspicious toolbar or extension (the trashcan icon on the right).

Go to Settings.

Scroll to the very bottom of the settings page and click Show advanced settings…

Scroll to the very bottom again and click Reset settings.

Click Reset.

 Mozilla Firefox:

Launch the browser and go to Add-ons.

Search for any suspicious toolbars and add-ons and Remove them.

We recommend going to Options (input about:preferences in your address field and press Enter) and clicking Restore to Default near the Home Page field.

You can also completely refresh the browser settings by entering the following in the address (URL) field:

about:support

Press Enter.

Click Refresh Firefox… and then click Refresh Firefox again.

 Microsoft Edge:

Since Microsoft Edge is not a separate program and is a core component of Windows 10 you should backup your computer or at least create a Restore Point before continuing.

Navigate to the following folder (where %username is your computer user name):

C:\Users\%username\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe

Clear all contents of the folder. Click CTRL + A to select everything and delete the contents.

Click Start (Windows logo).

Search for Windows PowerShell.

Right-click on the result.

Choose Run as administrator.

Paste the following command:

Get-AppXPackage -AllUsers -Name Microsoft.MicrosoftEdge | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register $($_.InstallLocation)\AppXManifest.xml -Verbose}

Press Enter.

The settings should now be reset to default.

 Internet Explorer:

Press and hold Windows () key and click R key.

Enter the following in the field:

cmd

Click OK.

Enter the following command in the appeared window:

RunDll32.exe InetCpl.cpl,ResetIEtoDefaults

Press Enter.

Check Delete personal settings.

Click Reset.

Alternatively you can run this command to delete all caches and settings:

RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 4351

After removing the virus

When you have finished removing the “Sleek search” adware and reverting your browser settings make sure to protect your computer by installing a good antivirus suite that would identify the threats online and in programs you have downloaded. Also, never install suspicious programs. If you are installing a new software, make sure it has nothing bundled in it by following the install wizard as well as searching for user reviews online.


Share your experience with us by leaving a comment!

Leave a comment to tell us about your experience removing this threat!
We can also help you if you run into any problems during the process, just don't hesitate to ask!

Leave a Reply

Your email address will not be published. Required fields are marked *