• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Tech Solutions / Internet Explorer: A program on your computer has corrupted your default search provider setting.

Internet Explorer: A program on your computer has corrupted your default search provider setting.

2013-02-22 by Jason

After some malware cleanup and a bigger battle to get the antivirus AVG uninstalled from a computer, the last remaining symptom was a message shortly after launching Internet Explorer. It stated:

Internet Explorer – Search Provider Default

A program on your computer has corrupted your default search provider setting for Internet Explorer.

Internet Explorer has reset this setting to your original search provider, Bin (www.bing.com).

Internet Explorer will now open Search Settings, where you can change this setting or install more search providers.

Unfortunately, the solution wasn’t as simple as IE’s reset or choosing a new search provider and making it the default. Even upgrading Internet Explorer 8 to version 9 still resulted in the same message.

error

Fortunately, the solution was able to be found on a Microsoft Answers thread. The trick is to delete a cache file that IE uses for the search history that must have become corrupted or at least no longer lined up with IE’s actual settings.

Step 1: Close Internet Explorer.

Step 2: Browse to C:UsersUserAppDataRoamingMicrosoftProtect

Step 3: Hit the Alt key to reveal the menu bar and go to Tools, Folder Options.

Step 4: Choose to show hidden files and uncheck to Hide protected system files under the View tab.

Step 5: Delete the CREDHIST file.

Step 6: Reset step 4 back to how it was.

credhist

You can now launch Internet Explorer and ensure that the error message does not appear. The CREDHIST file is recreated if it is missing the next time Internet Explorer is running. It just isn’t corrupted from the previous junk the next time.

Filed Under: Tech Solutions

Trending

  • The Results of Pwn2Own 2011
    In News, Security and Privacy
  • Microsoft, Adobe, and Java Security updates patch some doozies
    In Security and Privacy
  • Google Search Results Redirecting You To Ads? Receiving Popups? You May Have A Rootkit
    In Security and Privacy, Software, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • What is the AllJoyn Router Service on Windows 10? What is the AllJoyn Router Service on Windows 10?
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Troubleshooting time synchronization for domain-joined computers Troubleshooting time synchronization for domain-joined computers
  • 3d rendering circuit cloud for cloud computing technology What Is An Ellucian Migration And Is It Important?
  • Remote monitoring of text messages on a mobile device Remote monitoring of text messages on a mobile device
  • ​Great Tech Tips For Remote Workers ​Great Tech Tips For Remote Workers
  • Ideas That Will Free up MacBook Hard Drive Ideas That Will Free up MacBook Hard Drive
  • Advantages Of Video Conferencing For Small Businesses Advantages Of Video Conferencing For Small Businesses
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • What Is An Ellucian Migration And Is It Important?
  • Remote monitoring of text messages on a mobile device
  • ​Great Tech Tips For Remote Workers

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2021 · Magazine Pro Theme on Genesis Framework · WordPress · Log in