Removal Guide

Threat Level:
Rate this Article:
Comments (0)
Article Views: 965
Category: Browser Hijackers

If you have not encountered a browser hijacker in the past, you might be completely confused as to why replaces your normal homepage or default search provider tools. That is if you did not agree to these changes yourself. If you have downloaded the Easy Sports Access extension from its official download page,, from Chrome web store, or some other source, you must have known that your search tools would be modified. Despite this, you might be confused still. For example, when downloading the extension from, users are not informed about any modifications at all. In all fairness, the Chrome extension does not replace search tools per se. Instead, it modifies Chrome settings to show New Tab upon startup rather than your regular homepage. Of course, this is a good reason to remove from your browsers.

How does work? is a regular hijacker, which means that it changes your browser’s settings to introduce you to a different page and to gain some privileges. Unfortunately, some users think that this hijacker looks like a normal search provider, which is why they often consider it reliable. Would we suggest removing a program that was reliable? Of course we would not. The truth is that this search tool does not work as you expect it, and, instead of showing the results you might be waiting for, it performs redirecting to Yahoo Search. This is done via the server.,,, and plenty of other clones act in the exact same way. Although all of these hijackers are associated with different extensions and they might use different files, they are all identical, and researchers believe that they might belong to the same malicious party. Regardless of how this malicious software accesses your browsers – illegally or with your knowledge – you will find it in the same location every time. Firefox users need to check C:\Users\{user}\AppData\Roaming\Mozilla\Firefox\Profiles\[*]\Extensions, Chrome users will find it under C:\Users\{user}\AppData\Local\Google\Chrome\User Data\Default {or Profile}\Extensions, and IE users will locate it under C:\Users\user\AppData\Local\Temp\XP.

Fortunately, detecting this hijacker is easy. But what if this infection comes packaged with clandestine malware? According to our research, could be distributed via unreliable installers as well, which means that third-party malware could be attached to it. Hopefully, this is not the case, but you should not take any chances. Although there are several ways to discover malware, we advise running a malware scanner for quick and easy detection. It is imperative that you eliminate all threats even the ones that might look less harmful. If you are not quick to react, malware could take over your PC before you know it. Fortunately, the hijacker itself does not install malware; however, it can leak information about you and your operating system, which is also dangerous. Furthermore, the ads represented via the modified Yahoo Search tool could lead to unreliable sites as well. Needless to say, it is impossible to predict what kind of content could be shown to you. Legitimate links could be followed by ones leading to corrupted sites, as well as malware sites.

How to delete

Your computer must be unprotected. If it was, this hijacker would not have invaded your browsers. Even if you chose to install it, you would have been warned about a potential risk. We strongly recommend starting with the protection of your operating system. If you install strong security software that performs as an automated malware remover and anti-malware, you will not need to worry about the removal of or any other programs associated with this hijacker. If you choose to ignore the vulnerability of your virtual security, you will need to eliminate all existing threats manually. We show you how to get rid of the hijacker in the guide below. Do not forget to eliminate the registry keys that are listed below. When it comes to other infections, we advise running a malware scanner to identify them first. If you want to keep malware away, you have to be cautious when installing software, clicking on links, chatting with your friends, using external drives, or doing anything else.

Removal Instructions

Delete from Windows XP:

  1. Navigate to the left of the Taskbar and click the Start menu icon.
  2. Open the Control Panel menu and double-click Add or Remove Programs.
  3. Identify the undesirable program, click it, and choose Remove.

Delete from Windows Vista/Windows 7/Windows 8/Windows 10

  1. Launch RUN (simultaneously tap keys Win+R) and enter Control Panel.
  2. Open the tool and navigate to the Uninstall a program menu.
  3. Right-click the program you want to eliminate from your PC and click Uninstall.

Internet Explorer:

  1. Launch the browser, tap Alt+T, and choose Manage Add-ons.
  2. In the menu on the left click Search Providers and set the desired provider.
  3. Remove the undesirable provider and click Close.
  4. Tap Alt+T one more time and select Internet options.
  5. Click the General tab, change the Home Page URL, and click OK.
  6. Restart the browser.

Google Chrome:

  1. Launch the browser, tap Alt+F, and select More tools.
  2. Go to Extensions, click the recycle bin next to the unwanted one, and choose Remove.
  3. Navigate to the menu on the left and click Settings.
  4. Under On Startup mark Open a specific page or set of pages and click Set pages.
  5. Change the URL representing the hijacker and click OK.
  6. Under Search click Manage search engines and set the desired provider.
  7. Click X on the URL of the tool you want to eliminate and click Done.
  8. Restart the browser.

Mozilla Firefox:

  1. Launch the browser, tap Ctrl+Shift+A (Add-ons Manager), and select Extensions.
  2. Click the Remove button next to the undesirable extension.
  3. Tap Alt+T and choose Options.
  4. In the menu on the left click General and change the Home Page URL.
  5. In the menu on the left click Search.
  6. Remove the undesirable provider and set the one you wish to use.
  7. Restart the browser.

Registry leftovers:

  1. Simultaneously tap Win+R to launch RUN.
  2. Type regedit.exe and click OK.
  3. Right-click the entry and select Run as administrator to launch Registry Editor.
  4. In the pane on the left go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing.
  5. Right-click and Deletethese keys:
    • My Email XP_RASAPI32
    • My Email XP_RASMANCS
Download Remover for *
*SpyHunter scanner, published on this site, is intended to be used only as a detection tool. To use the removal functionality, you will need to purchase the full version of SpyHunter. Screenshots:


Your email address will not be published.


Enter the numbers in the box to the right *