– A Fake Search Engine Associated with Malware is disguised as a legitimate search engine. However, all this website does is display the same results as the Google search engine, but including a large number of advertisements and malicious content interspersed within the text. So, one may think, why would anyone use when they can instead use Google or any of the other reliable search engines on the market? The fact is that most of the people that visit or use's search engine are not doing so because they want to, but because they are forced to do so. is a browser hijacker. Browser hijackers take control of an Internet browser and force it to visit specific web pages, display pop-up windows and relay private information to a third party. There are a variety of browser hijackers that are associated with According to ESG PC security researchers, not all browser hijackers are the same; a browser hijacker may take the form of a fairly innocuous toolbar to a full-fledged rootkit infection.

Browser Hijackers and the Fake Search Engine is associated with several different kinds of browser hijackers. The most well-known of these is the Google Redirect Virus, a browser hijacker that is also closely linked to the TDSS Rootkit. The Google Redirect Virus is not a proper virus (because it does not replicate itself or spread on its own) but is more correctly considered as a Trojan. The Google Redirect Virus receives its name because it changes the results on any searches carried out on the Google search engine. While the results displayed will be the same, the links for each result will have been changed so that they will link to malicious websites, such as Other browser hijackers may simply take you to websites like directly, whenever you click on a link or type an address into the navigation bar in your Internet browser. Browser hijackers associated with may also change plain text on any web pages displayed into hyperlinks leading to malicious websites like If your Internet browser is forcing you to visit the fake search engine, this is a sign of a severe malware infection. ESG security researchers recommend scanning your computer system in search for any browser hijackers that may be lying in wait. You should not ignore any redirects to the website; this is a sure way of infecting your computer system with other, even more dangerous malware problems.

Infected with Scan Your PC

Download SpyHunter's Spyware Scanner
to Detect
* SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.

If you still can't install SpyHunter? View other possible causes of installation issues.

Technical Information

File System Details creates the following file(s):
# File Name
1 uacinit.dll
2 VOIDmainqt.dll
3 _VOID.sys
4 _VOID.dll
5 wdmaud.sys
6 UAC.sys
7 4DW4R3c.dll
8 C:\Windows\System32\Drivers\etc\Hosts\malicious host of
9 UAC.dll
10 4DW4R3.sys
11 4DW4R3.dll
12 _VOID.dat
13 UAC.db
14 4DW4R3sv.dat
15 %Temp%\tmp[RANDOM NUMBERS].tmp
16 UAC.dat
17 UAC.tmp
19 uactmp.db
20 _VOID.tmp

Registry Details creates the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\CustomizeSearch=[site address]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Search\CustomizeSearch=[site address]
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\SearchAssistant=[site address]
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Bar=[site address]

Site Disclaimer

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.

IMPORTANT! To be able to proceed, you need to solve the following simple math.
Please leave these two fields as is:
What is 4 + 8 ?