Sync.js/Fpi.js “Virus” Removal (from

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.

This page aims to help you remove the Sync.js/Fpi.js “Virus”. These Sync.js/Fpi.js “Virus” removal instructions work for Chrome, Firefox and Internet Explorer, as well as every version of Windows.

If you are interested in the information below, you have probably been annoyed by some technical issues regarding some unwanted and possibly intrusively popping up ads. Such advertisements might appear in different forms on your computer screen. If this description explains your case, you have most likely caught Sync.js/Fpi.js “Virus” . The article you are going to read will certainly come in handy to you if you want to fully understand the characteristic features of your recent issues. We have prepared a set of removal steps at the end of the page to guide you through the uninstallation of Sync.js/Fpi.js “Virus” .

Nature of Adware

To begin with, there is a brief explanation of what Adware is about.  You might have already heard of the term Adware. The aforementioned name stands for the ad-generating software products that are programmed to generate ads in diverse forms on your screen. It is also possible that some Adware programs could redirect your search requests to possibly infected webpages that may contain actual malware like Ransomware. That is probably why such software products are often seen as quite shady. In fact, it is also possible that they might actually collect data about your browsing habits without your knowledge. Adware that gathers such data without your consent should not be mistaken for malware or a virus which collects personal information, since that practice is common for most online platforms.

Adware DOESN’T steal banking or account credentials. Nevertheless, the data about your recent searches and  preferences could be sold to 3rd parties.

How was your PC infected?

These are the most typical ways in which Adware can infiltrate your system:

  • Adware might integrate into your computer together with any freeware or shareware software. Actually, this is an absolutely legitimate practice. Direct marketing and advertisements generate huge profits and such applications do make solid revenue and fund the companies of their developers.
  • One more way of infecting with an Adware is by visiting an already contagious website. If this is your case, the results for you may include the unauthorized installation of Adware on your computer.

When you install a particular free software program on your computer or visit an infected webpage while being unprotected, the Adware-generating browser plug-ins are installed as well. It’s essential to claim that such a potentially unwanted program could be able to infiltrate all widely used browsers such as Chrome, Firefox and Explorer.

Typical features and possible effects of Sync.js/Fpi.js

Sync.js/Fpi.js is identified as an Adware. It is most likely to have infiltrated your system from within a software bundle, typically without you realizing you are installing a bundle in the first place. Sync.js/Fpi.js may start to keep track of your  online activities, no matter which browser you are using (Mozilla, Chrome. IE, Opera). The reason for such a research is that this Adware will try to guess what products and services you will most probably be interested in and display mostly ads that are related to them.

Imagine that you download a bundle and Sync.js/Fpi.js is secretly lurking inside it. Then you install it on your computer. When you make a search request about any service or product, the already installed Adware-like program begins generating only ads that are related to it. For example, you are looking for some useful advice on which is the best airline that provides flights to Tokyo at reasonable prices. Soon enough you will end up being showered mainly by ads that promote flight tickets to Tokyo at the best prices.

Of course, at times such suggestions might even come in handy to you. However, some people may find that research on their preferences more like an intrusion into their personal privacy. Consequently, they begin to search for ways to remove Sync.js/Fpi.js as soon as they realize their systems have been infected with it.

Is it possible to remove  Sync.js/Fpi.js without causing any further damage

First of all, we are going to explain some prevention tips that may interest you.

As you have already been informed, most Adware-like products and Sync.js/Fpi.js in particular generally come within software bundles. Even in case you do need and download such software, you can still avoid installing the Adware that could be hidden inside it by following some easy, yet very efficient pieces of advice.

The first thing you are supposed to do is to be careful with is what option of the program installer you choose during the installation process. You should always read all the menus and go through the End-User Agreement. Then the best possible choice is to go with the “Manual/Customized” installation option. That’s how you will have the chance to select what to install on your computer and what to leave behind. By always choosing that option you will eliminate the risk of getting infected with Sync.js/Fpi.js to some extent. There is some more useful advice- always use your pop-up blocker, anti-virus program and firewalls. Also, make sure that you update them on a regular basis so that they can protect you well.

Luckily, if you have already been infected with Sync.js/Fpi.js, it is still possible to get rid of it. We have prepared a special set of removal tips for you to guide you through the uninstallation process of this Adware. We believe that you will find them useful and they will assist you in dealing with your problems.


Name Sync.js/Fpi.js (from
Type  Browser Hijacker
Danger Level Medium (nowhere near threats like Ransomware, but still a security risk)
Symptoms Many constantly appearing ads in various forms. Sluggish overall computer performance.
Distribution Method Typically lurking within a software bundle, a torrent webpage or any other shareware.
Detection Tool Sync.js/Fpi.js may be difficult to track down. Use SpyHunter – a professional parasite scanner – to make sure you find all files related to the infection.

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version.
More information about SpyHunter and steps to uninstall.


Sync.js/Fpi.js “Virus” Removal

Readers are interested in:


Reboot in Safe Mode (use this guide if you don’t know how to do it).

This was the first preparation.


To remove parasite, you may have to meddle with system files and registries. Making a mistake and deleting the wrong thing may damage your system.
Avoid this by using SpyHunter - a professional Parasite removal tool.

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.

Reveal All Hidden Files and Folders.

  • Do not skip this  – Sync.js/Fpi.js may have hidden some of its files.

Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.


Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Right click on the browser’s shortcut —> Properties.

NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).


Properties —–> Shortcut. In Target, remove everything after .exe.

ie9-10_512x512  Remove Sync.js/Fpi.js from Internet Explorer:

Open IE, click  IE GEAR —–> Manage Add-ons.

pic 3

Find the threat —> Disable. Go to IE GEAR —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

firefox-512 Remove Sync.js/Fpi.js from Firefox:

Open Firefoxclick  mozilla menu  ——-> Add-ons —-> Extensions.

pic 6

Find the adware/malware —> Remove.
chrome-logo-transparent-backgroundRemove Sync.js/Fpi.js from Chrome:

Close Chrome. Navigate to:

 C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

Rename the Folder to Backup Default

Rename it to Backup Default. Restart Chrome.

  • At this point the threat is gone from Chrome, but complete the entire guide or it may reappear on a system reboot.


Press CTRL + SHIFT + ESC simultaneously. Go to the Processes Tab. Try to determine which ones are dangerous. Google them or ask us in the comments.


This is the most important and difficult part. If you delete the wrong file, it may damage your system irreversibly. If you can not do this,
>> Download SpyHunter - a professional parasite scanner and remover.

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.

Right click on each of the problematic processes separately and select Open File LocationEnd the process after you open the folder, then delete the directories you were sent to.



Type Regedit in the windows search field and press Enter.

Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

Remember to leave us a comment if you run into any trouble!