Severity scale:  

Remove (Improved Guide) - Virus Removal Instructions

removal by Linas Kiguolis - -   Also known as Certified Toolbar, redirect, hijack | Type: Browser Hijackers – a browser hijacker that alters new tab bar settings to open its own search page automatically virus is a browser hijacker[1] that creates an image of a legitimate search engine. However, not everything is as harmless as it might seem from the first view. Even though technically, this PUP is not a dangerous malware form, it still performs some alterings and activities that are unpleasant or potentially malicious. Search certified toolbar can modify the Task Manager and Registry to drop its own load that allows executing the PUP whenever the machine is booted.

Continuously, virus can append the shortcut to your Windows desktop and Start bar. If you open a file that has this shortcut attached to it, you will be directly sent to the homepage of the browser hijacker.

Questions about

The main purpose of certified search toolbar is to change the default search provider, homepage, and new tab URL bar to Afterward, the new settings will always appear while you open the hijacked web browser and even trying to set Google as your default provider again does not help to reverse the changes, according to one infected user.[2] Another dissatisfied person claims that this program has hijacked even two web browsers, the outlook mail account, and is very difficult to get rid of due to hiding in the computer system[3]

Also known as Search certified toolbar/certified search toolbar
Type/category Browser hijacker/potentially unwanted program
Activities This suspicious product alters major browser settings such as the homepage, new tab URL, and search zone. Continuously, the PUP adds odd shortcuts to the Windows desktop and start menu, provides intrusive advertisements, can redirect to affiliate and potentially dangerous sources, might collect non-personal information that is related to the user's browsing activities, habits, and experience
Spreading Browser hijackers are often delivered by a stealth distribution technique known as “software bundling”. The PUP can come from rogue downloading sources such as,,, or camouflage as legitimate-looking Adobe Flash Player, Java Script updates
Elimination You can terminate the browser hijacker with the help of automatical malware removal software or by employing the manual step-by-step guidelines that have been appended to the end of this article
Fix tool If you have found any signs of system compromisation, you can try repairing the corrupted areas with the help of software such as Reimage Reimage Cleaner Intego or any other automatical program that is reliable and you are likely to use

The new search engine that is appended by will likely aim to generate search results from another legitimate search provider such as Google, Bing,[4] or Yahoo. Regarding this fact, the hijacked engine does not provide any true value to you and can bring more disadvantages than positive features.

Besides, can easily make you install its toolbar (Certified Toolbar) which is capable of showing altered search results. Even though the browser hijacker developers might try to convince you that their product is here to help you to search faster throughout the Internet, this is only a marketing trick used for “selling” the app.

Search certified toolbar is a browser-hijacking app that displays various advertisements regarding fake security software, game offers, coupons, etc.

Search certified toolbar also aims to produce intrusive advertisements while using its services. You can be provided with various online game offers, shopping deals, rogue security system products, urges to fix your poor computer performance, etc. Keep in mind that all of these offers and deals are income-based and created to satisfy the developers only.

Another bad side of is that it can produce advertisements that aim to redirect people to questionable-looking domains. Even though most of them will likely appear just filled with sponsored content, some of the websites might include malware-laden programs and bring serious harm to your computer system.

Finally, just like other questionable search engines, may start tracking your browsing habits and online experience. Typically, it collects search terms, mostly visited websites, data that is added when visiting each of the user's favorite sites and so on. Typically, this information is considered as personally non-identifiable.

However, it may be used for unfair marketing companies and similar aims. might use the gathered information for sharing it with other parties for more monetary income. Also, the developers can employ this type of data to “work” for them and let them benefit from targeted advertising campaigns. browser - a potentially unwanted program that comes in a bundle with other free programs from unsecured websites such as,, and

That is why we would like to offer you to remove If it has shown up on your computer without your approval, you should use the manual guide below or employ trustworthy antimalware software. This will help you to get rid of all potentially unwanted programs, like browser hijackers, adware, and similar intruders. Also, you can try out another piece of software such as Reimage Reimage Cleaner Intego that might help you to fix all compromised entries on your machine. removal has to be completed in all the sections that the browser hijacker when through. This includes various directories of your Windows or Mac machine, and also possibly-infected web browser applications such as Google Chrome, Mozilla Firefox, Internet Explorer, Microsoft Edge, and Safari.

Ways through which browser hijackers enter devices

Cybersecurity specialists from[5] claim that browser hijackers are distributed by using stealth techniques such as “software bundling”. This type of process succeeds when the PUP is downloaded together with some type of freeware or shareware of the Internet. Users are likely to receive a browser hijacker while downloading various PDF converters, download managers, and similar products from third-party sources such as,, and

What you have to do in order to prevent secret browser hijacker installation is very simple. First, always take care of your downloads and installations properly. This means pay attention to every step while you are downloading/installing a program and do not skip any. Afterward, ensure that you have chosen the right configuration settings. Always use those that are marked as “custom” or “advanced” and do not forget to deselect all questionable incoming products.

Furthermore, browser hijackers can pretend to be legitimate software updates (e.g. JavaScript, Adobe Flash Player, etc.) and trick users into upgrading some type of program when, in reality, he/she receives the potentially unwanted program instead. Always be careful while downloading updates from the Internet. You are advised to get them from the software's original website. Also, use antivirus software that will warn you if something suspicious is waiting on a certain website. removal instructions removal is necessary if you want to get rid of all the unexpected changes that the browser hijacker has initiated on your web browsers. Completely removing the threat is the only way to clean both your operating system and browsing apps. If you leave any questionable registries or files on your computer, the browser-hijacking application might automatically launch itself within the next machine boot process.

If you want to remove by yourself, we have provided specific step-by-step guidelines at the end of this article that should help you to clean your Windows/macOS computer system and web browser apps such as Chrome, Firefox, Explorer, Edge, and Safari. Alternatively, you can download trustworthy malware removal software and successfully get rid of the cyber threat automatically. Note that using antimalware programs is very recommendable as it requires less of the user's effort and can bring even more efficiency to the process.

You may remove virus damage with a help of Reimage Reimage Cleaner Intego. SpyHunter 5Combo Cleaner and Malwarebytes are recommended to detect potentially unwanted programs and viruses with all their files and registry entries that are related to them.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove, follow these steps:

Get rid of from Windows systems

To terminate the browser hijacker from your Windows computer system and get rid of all the additional products that it has brought, apply the following guiding steps

  1. Click Start Control Panel Programs and Features (if you are Windows XP user, click on Add/Remove Programs). Click 'Start -> Control Panel -> Programs and Features' (if you are 'Windows XP' user, click on 'Add/Remove Programs').
  2. If you are Windows 10 / Windows 8 user, then right-click in the lower left corner of the screen. Once Quick Access Menu shows up, select Control Panel and Uninstall a Program. If you are 'Windows 10 / Windows 8' user, then right-click in the lower left corner of the screen. Once 'Quick Access Menu' shows up, select 'Control Panel' and 'Uninstall a Program'.
  3. Uninstall and related programs
    Here, look for or any other recently installed suspicious programs.
  4. Uninstall them and click OK to save these changes. Right click on each of suspicious entries and select 'Uninstall'
  5. Remove from Windows shortcuts
    Right click on the shortcut of Mozilla Firefox and select Properties. Right click on browsers' icon and select 'Properties'
  6. Go to Shortcut tab and look at the Target field. Delete malicious URL that is related to your virus. Select 'Shortcut' tab and delete '' or other suspicious URL

Repeat steps that are given above with all browsers' shortcuts, including Internet Explorer and Google Chrome. Make sure you check all locations of these shortcuts, including Desktop, Start Menu and taskbar.

Eliminate from Mac OS X system

If your macOS is displaying some infection symptoms, proceed with the following guide:

Remove from Applications folder:

  1. From the menu bar, select Go > Applications.
  2. In the Applications folder, look for entries.
  3. Click on the app and drag it to Trash (or right-click and pick Move to Trash)Uninstall from Mac 1

To fully remove, you need to access Application Support, LaunchAgents, and LaunchDaemons folders and delete relevant files:

  1. Select Go > Go to Folder.
  2. Enter /Library/Application Support and click Go or press Enter.
  3. In the Application Support folder, look for any dubious entries related to and then delete them.
  4. Now enter /Library/LaunchAgents and /Library/LaunchDaemons folders the same way and terminate all the entries.Uninstall from Mac 2

Delete from Internet Explorer (IE)

To clean Internet Explorer from major changes on its default search provider, homepage, and new tab URL bar, use the below-provided step-by-step guidelines

Remove dangerous add-ons:

  1. Open Internet Explorer, click on the Gear icon (IE menu) on the top-right corner of the browser
  2. Pick Manage Add-ons.
  3. You will see a Manage Add-ons window. Here, look for and other suspicious plugins. Click on these entries and select Disable.Remove add-ons from Internet Explorer

Change your homepage if it was altered:

  1. Open IE and click on the Gear icon.
  2. Select Internet Options.
  3. In the General tab, delete the Home page address and replace it by your preferred one (for example,
  4. Click Apply and then select OK.Reset IE homepage

Delete temporary files:

  1. Press on the Gear icon and select Internet Options.
  2. Under Browsing history, click Delete…
  3. Select relevant fields and press Delete.Clear temporary files from Internet Explorer

Reset Internet Explorer:

  1. Click on Gear icon > Internet options and select Advanced tab.
  2. Select Reset.
  3. In the new window, check Delete personal settings and select Reset again to complete removal.Reset Internet Explorer

Erase from Microsoft Edge

Delete unwanted extensions from MS Edge:

  1. Select Menu (three horizontal dots at the top-right of the browser window) and pick Extensions.
  2. From the list, pick the extension and click on the Gear icon.
  3. Click on Uninstall at the bottom.Remove extensions from Edge

Clear cookies and other browser data:

  1. Click on the Menu (three horizontal dots at the top-right of the browser window) and select Privacy & security.
  2. Under Clear browsing data, pick Choose what to clear.
  3. Select everything (apart from passwords, although you might want to include Media licenses as well, if applicable) and click on Clear.Clear Edge browsing data

Reset MS Edge if that above steps did not work:

  1. Press on Ctrl + Shift + Esc to open Task Manager.
  2. Click on More details arrow at the bottom of the window.
  3. Select Details tab.
  4. Now scroll down and locate every entry with Microsoft Edge name in it. Right-click on each of them and select End Task to stop MS Edge from running.Reset MS Edge

If this solution failed to help you, you need to use an advanced Edge reset method. Note that you need to backup your data before proceeding.

  1. Find the following folder on your computer: C:\\Users\\%username%\\AppData\\Local\\Packages\\Microsoft.MicrosoftEdge_8wekyb3d8bbwe.
  2. Press Ctrl + A on your keyboard to select all folders.
  3. Right-click on them and pick DeleteAdvanced MS Edge reset 1
  4. Now right-click on the Start button and pick Windows PowerShell (Admin).
  5. When the new window opens, copy and paste the following command, and then press Enter:

    Get-AppXPackage -AllUsers -Name Microsoft.MicrosoftEdge | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register “$($_.InstallLocation)\\AppXManifest.xml” -VerboseAdvanced MS Edge reset 2

Instructions for Chromium-based Edge

Delete extensions from MS Edge (Chromium):

  1. Open Edge and click select Settings > Extensions.
  2. Delete unwanted extensions by clicking Remove.Remove extensions from Chromium Edge

Clear cache and site data:

  1. Click on Menu and go to Settings.
  2. Select Privacy and services.
  3. Under Clear browsing data, pick Choose what to clear.
  4. Under Time range, pick All time.
  5. Select Clear now.Clear browser data from Chroum Edge

Reset Chromium-based MS Edge:

  1. Click on Menu and select Settings.
  2. On the left side, pick Reset settings.
  3. Select Restore settings to their default values.
  4. Confirm with Reset.Reset Chromium Edge

Remove from Mozilla Firefox (FF)

  1. Remove dangerous extensions
    Open Mozilla Firefox, click on the menu icon (top right corner) and select Add-ons Extensions. Click on menu icon and select 'Add-ons'
  2. Here, select and other questionable plugins. Click Remove to delete these entries. Select 'Extensions' and look for malicious entries. Click 'Remove' to get rid of each of them
  3. Change your homepage if it was altered by virus:
    Click on the menu (top right corner), choose Options General.
  4. Here, delete malicious URL and enter preferable website or click Restore to default.
  5. Click OK to save these changes. When in 'General' tab, delete malicious URL from 'Home Page' section or click on 'Restore to Default' button. Click 'OK' to save changes
  6. Reset Mozilla Firefox
    Click on the Firefox menu on the top left and click on the question mark. Here, choose Troubleshooting Information. Click on menu icon and then on '?'. Select 'Troubleshooting Information'
  7. Now you will see Reset Firefox to its default state message with Reset Firefox button. Click this button for several times and complete removal. Click on 'Reset Firefox' button for a couple of times

Uninstall from Google Chrome

To erase suspicious extensions from Google Chrome and reverse your web browser back to its previous position, complete the following instructions

  1. Delete malicious plugins
    Open Google Chrome, click on the menu icon (top right corner) and select Tools Extensions. Click on menu icon. Select 'Tools' and 'Extensions'
  2. Here, select and other malicious plugins and select trash icon to delete these entries. Look for malicious entries and delete each of them by clicking on the Trash bin icon
  3. Change your homepage and default search engine if it was altered by your virus
    Click on menu icon and choose Settings.
  4. Here, look for the Open a specific page or set of pages under On startup option and click on Set pages. After clicking on menu and 'Settings', select 'Set pages'
  5. Now you should see another window. Here, delete malicious search sites and enter the one that you want to use as your homepage. Click 'X' to remove malicious URLs
  6. Click on menu icon again and choose Settings Manage Search engines under the Search section. When in 'Settings', select 'Manage search engines...'
  7. When in Search Engines..., remove malicious search sites. You should leave only Google or your preferred domain name. Click 'X' to remove malicious URLs
  8. Reset Google Chrome
    Click on menu icon on the top right of your Google Chrome and select Settings.
  9. Scroll down to the end of the page and click on Reset browser settings. When in 'Settings', scroll down to 'Reset browser settings' button and click on it
  10. Click Reset to confirm this action and complete removal. Click on 'Reset' button to complete your removal

Get rid of from Safari

  1. Remove dangerous extensions
    Open Safari web browser and click on Safari in menu at the top left of the screen. Once you do this, select Preferences. Click on 'Safari' and select 'Preferences'
  2. Here, select Extensions and look for or other suspicious entries. Click on the Uninstall button to get rid each of them. Go to 'Extensions' and uninstall malicious add-ons
  3. Change your homepage if it was altered by virus:
    Open your Safari web browser and click on Safari in menu section. Here, select Preferences as it was displayed previously and select General.
  4. Here, look at the Homepage field. If it was altered by, remove unwanted link and enter the one that you want to use for your searches. Remember to include the "http://" before typing in the address of the page. When in 'General', delete malicious URL and enter your desired domain name
  5. Reset Safari
    Open Safari browser and click on Safari in menu section at the top left of the screen. Here, select Reset Safari.... Click on 'Safari' and select 'Reset Safari...'
  6. Now you will see a detailed dialog window filled with reset options. All of those options are usually checked, but you can specify which of them you want to reset. Click the Reset button to complete removal process. Select all options and click on 'Reset' button

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.

The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login. 

VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Linas Kiguolis
Linas Kiguolis - Expert in social media

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Linas Kiguolis
About the company Esolutions

Removal guides in other languages

  1. ShelleyC says:
    October 25th, 2012 at 6:43 am

    Unfortunately, hijacker stops my malwarebytes full scan as well as Microsoft Security Essentials full scans as well. Both will perform a quick scan completely, but show no infections. Read that this malware can mutate and is hard to remove. I first noticed it in Task Manager with “Glary” in the file/path after name of toolbar (Im kind of a newbie and dont really know all of the technical/proper computer lingo, so…Im going to try and do it manually from registry and files and am using an older desktop with this message. This hijacker is not on this computer in use now, but on a new laptop w/Win7 64bit. If deleting registry/and/or files works, I believe I will still contact a computer tech repair to get rid of this monster. Unless some software can come up with a good, clean fix, Ive no choice. Regards and thanks for info. Wonder if downloading Glary file opener or Glary Utilities downloaded this thing as the path/file name located to the right of the entry in Task Manager did state “glary,” perhaps I will contact Glarysoft and see if that did, indeed, happen and if they have any recourse for removing this beast. Oh, did delete process in Task Manager, but still experience re-directs in browser (IE9) to the website, but I believe Ive gotten out of the redirect as soon as I see it has changed.
    Again, thanks for info and if I get any truly good info on how to remove once and for all, I will contact via this site. Good luck to all, in the meantime!

  2. ShelleyC says:
    October 25th, 2012 at 6:53 am

    Hi: Back again on new laptop that has this virus and am going to download SpyHunter trial to see if that works. Hope dont have to purchase to actually remove any threats like StopZilla did (and it only found cookies). Will advise if SpyHunter works on this thing; keeping fingers and toes crossed!

  3. Christopher says:
    November 10th, 2012 at 12:39 am

    Hey Thanks Very Much! I Finally Installed spyware . I Was Wondering Why It Wouldn’t Install. Thanks!!!
    Thank you very much! This is the only working description for this problem.

    But give me information that how same virus can deteted my PC????

  4. Margie says:
    January 18th, 2013 at 3:10 pm

    as anyone been able to delete because everything I tried hasnt worked PLEASE HELP

  5. Best beta says:
    January 20th, 2013 at 5:28 pm

    works fine. thanks

  6. Martin Stander says:
    January 21st, 2013 at 5:31 am

    Windows 7. I uninstalled it and removed it from my browsers. Unfortunately this had no effect. My infestation was so bad that the complete Office suite was infected. I open Outlook and is greeted with Certified-Toolbar Search. I open Excel and the same thin happens. I tried deleting it in the Registry with no luck. I would reboot and it is still there. Do another search of the Registry and there is nothing. But still it is everywhere in the browsers and Office.

    As a last resort I rolled back Windows to the day I knew I got infected. Voila, its gone. If you get infected, spare yourself the trouble and just roll back

  7. murf says:
    January 21st, 2013 at 8:02 pm

    I tried to roll it back, but it said it couldnt do it because some files were still in use, even tried spybot in safe mode, still there.

  8. torafujin says:
    May 12th, 2013 at 6:29 pm

    Spent 2 months trying to get rid of this (couldnt roll-back because of some necessary security files added later). Gave up. Last week, however, got infected by some other browser-hijacker. 2 hours of cleaning out Control Panel, browsers, registry files. Final result: not only removed the new hijacker, but that hijacker had managed to kick out Search.Certified-Toolbar. Admittedly, not the best solution to this problem, but thought it might help to know that curing the re-infection appears to cure the original disease.

  9. grant mitchell says:
    January 22nd, 2013 at 5:33 pm

    How much information do you need from the good people, for gods sake. CertifiedTToolbar, by its own accounts, is based in Ben Gurion Rd. somewhere in Israel. The interpretation you give of the identity of this extremedly hostle malware is pure disinformation. This toolbar/ hijacker does not log into the Windows reference pages, cannot be searched for, located, or removed, regardless of what you say. It even destroys my ability to print news, albeit political, articles. Please, please, no more baby talk.

  10. Giulio says:
    January 27th, 2013 at 2:06 am


    I tried SpyHunter and MalwareBytes Anti-malware. but both failed. At best, they crippled the bastard virus a bit and it became not that annoying, but knowing that he was still there was unsettling. The directions to MANUALLY kill it that are available in some forum on the web would be the best, but they are really difficult to follow, since they are intended for specialists and many step are missing. I sorted it out by entrusting the specialized company,, to do the job and at a cost of about 70 USD they took over my PC and got rid of this virus in 20 minutes. I suggest it to everyone who is not an expert. At the moment no antivirus software can kill it. I am a private and I have nothing to do with, I support them because they sorted me out fast and professionally.

  11. K J Boland says:
    January 28th, 2013 at 5:19 am

    tried everything, Malware bytes, superantispyware and paid for SpyHunter.

    Spyhunter finds and says it removes, but it always is there when I reload firefox.

    Note: it is not showing as an add on. or as a program to remove.

  12. Capeloni says:
    January 28th, 2013 at 4:02 pm

    I spend U$39 wirh spyhuner and irt didnt remove it

  13. NoOneSpecial says:
    February 5th, 2013 at 5:32 am

    I tried over and over but it just was not going to be . it has infected my microsoft word too

  14. Claudia says:
    February 8th, 2013 at 6:23 am

    Thank you! I didnt know what was happening when I kept getting re-directed to, until I googled it and came here. Following your instructions, I had it removed in just a few minutes.

  15. l.kheinz says:
    August 12th, 2013 at 5:34 pm

    Nach Ihren Vorgaben, hatte ich es in ein paar Minuten entfernt. umgeleitet gehalten, bis ich es gegoogelt
    Nach Ihren Vorgaben, hatte ich es in ein paar Minuten entfernt
    Was sind die Vorgaben???

  16. unknown says:
    February 13th, 2013 at 6:31 pm

    restore it to factory SETTINGS

  17. deshichain says:
    March 16th, 2013 at 6:39 am

    send gift to bangladesh
    online shopping in bangladesh
    online gift in bangladesh

  18. vesa virtanen says:
    August 24th, 2013 at 1:31 pm

    EI AVAUDU, tuskin poistaasertified toolbar search ohjelmaa

Your opinion regarding