Removal Guide

Threat Level:
Rate this Article:
Comments (0)
Article Views: 209
Category: Browser Hijackers is one of those browser hijackers that take users by surprise. They do not look like anything dangerous, and they are not. But having one on your browser can definitely be a nerve-wracking experience. In order to protect your system from potential exploitation, you should remove from your browser the moment you notice it. While you are at it, you should also consider acquiring a powerful antispyware tool that would help you locate other unwanted applications. The chances are you have a lot of unwanted apps on-board because such security threats seldom travel on their own.

The thing we would like to emphasize about this browser hijacker is that users download and add it to their browsers willingly. You might want to protest this statement because who would want to have a tool that might prove to be detrimental to their system’s security? No one. Yet, and other similar programs cannot enter target systems unless users allow them to. So the fact that users say “yes” to this intruder must be related to its distribution method. After all, adding this application to your system via direct distribution source is highly unlikely.

This is where the freeware distribution method comes into picture. Browser hijackers, adware, potentially unwanted programs, and other suspicious software usually employ bundled downloads to get around the web. Bundled downloads refer to third-party installers that carry several applications within. So, for instance, a program you download from a file-sharing website might come with additional features and applications you do not even need. If you check every single step on the installation wizard carefully, you should be able to deselect the unnecessary programs, but breezing through the process will only result in installing a number of unnecessary apps. Consequently, might be one of them.

This application functions as your regular browser hijacker, so there is not that much to cover about its behavioral patterns. We do know that comes from the same group as,,, and a number of other browser hijackers. All of them get distributed through file-sharing websites, and they affect Chrome, Firefox, and Internet Explorer.

Upon installation, changes your homepage and default search engine settings. You may not use the program’s domain for your searches, but most of your queries will eventually be redirected to a modified Yahoo! Search page, where you will see modified search results. These results will be modified based on your likes and preferences. It also proves that tracks your online activity via tracking cookies.

This kind of behavior is far from extremely malicious, but the information collected by this browser hijacker could also be exploited by malevolent third parties. So while is not a direct security threat, it could be misused by cyber criminals because it is very vulnerable to third-party exploitation.

To protect yourself and your system from such consequences, you need to remove right now. Luckily, it is not complicated to terminate this hijacker manually, and you can do it following the instructions below. For further security enforcement, please get yourself a licensed antispyware tool.

How to Remove

Internet Explorer

  1. Press Win+R and type Control Panel. Click OK.
  2. Go to Uninstall a program (Add or remove programs for Windows XP).
  3. Highlight and uninstall Your Transit Info Now.


  1. Press Win+R and the Run prompt will open.
  2. Type %AppData% into the Open box and click OK.
  3. Go to Mozilla\Firefox\Profiles\[Unique User ID].
  4. Use Notepad to open the prefs.js file.
  5. Delete this string: user_pref("browser.startup.homepage", "");
  6. Save changes and close the file.


  1. Press Win+R and type %LocalAppData%. Click OK.
  2. Go to Google\Chrome\User Data\Default.
  3. Locate and delete these files: Preferences, Secure Preferences, and Web Data.
Download Remover for *
*SpyHunter scanner, published on this site, is intended to be used only as a detection tool. To use the removal functionality, you will need to purchase the full version of SpyHunter. Screenshots:

Comments are closed.