Description Screenshot is a search site that reroutes traffic to the Yahoo’s search engine. Although such a minor misrepresentation of the site’s purpose is no crime, malware researchers were unhappy to link the promotion of to attacks made by browser hijacks that may change your Web browser automatically. Since the corresponding browser issues affect both your browser’s potential performance and its overall Web safety, contact with should be kept to a minimum, and removing hijackers, when needed, should use appropriate system-scanning utilities.

The Uncertain Browsers Benefits Opened Up by is a ‘search’ site without any actual Web-searching functions; visitors attempting to use this apparent feature may find themselves redirected to Yahoo Search with additional advertisements inserted by A recent campaign of browser-hijackings supports this attempt to cash-in on its traffic; a campaign that malware researchers found rising in incidents in the summer of 2014. Symptoms of typical browser hijacks may include:
  • Hijacked homepages may be set to load, irrespective of your original settings.
  • Web browsers may fail to respond to future changes in your homepage, search engine, default new tab or other settings.
  • Shortcuts for unrelated programs or websites may launch instead of their original targets, or in addition to them.

A small number of PC security companies also have classified as a corrupted website.

» Learn more about SpyHunter's Spyware Detection Tool
and steps to uninstall SpyHunter.

However, malware experts have failed to find any unsafe content on – although that fact doesn’t make visiting a good idea. hijackers avoid displaying components that would let their users remove them or disable them easily, and effectively are tantamount to low-level threats. Universally, hijackers also are installed automatically, which may indicate that other threats also have an interest in promoting

The Key to Ditching a Homepage

Besides being one of the most basic ways to deceive PC users into funneling traffic, and therefore profit, to its administrators, has little unique about Chrome users seem to be especially vulnerable to hijacks, which may indicate that the responsible software was copy-pasted from a similarly Chrome-exclusive program in the past. Regardless of that fact, any PC user who sees their browser loading automatically should run a scan on their computer with appropriate PC security solutions.

Typical reactions to browser-redirecting PUPs like’s hijackers are to reset your browser’s settings, reinstall the Web browser or just switch to a different browser. In all cases, these solutions may skirt the symptoms of a hijacker without removing the related program from your computer. Over time, the security issues of allowing Potentially Unwanted Programs to linger on your hard drive may turn into problems related to other PC threats, and malware experts see every reason to recommend the most comprehensive security tools available for deleting any similarly untrustworthy software. Automatic Detection Tool (Recommended)

Is your PC infected with To safely & quickly detect we highly recommend you run the malware scanner listed below.

Visual & GUI Characteristics Screenshot Screenshot Screenshot 4

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
  • The following files were created in the system:
    # File Name Detection Count
    1 %APPDATA%\key-find 159

Registry Modifications

Tutorial: To edit and delete registry entries manually, read the tutorial on how to remove malicious registry entries.

Tip & Warning: Editing and removing the wrong registry keys can severely damage your PC, so remember to backup your Windows Registry! To optimize your Windows Registry and speed up your PC, download RegHunter's registry cleaner.
  • The following newly produced Registry Values are:
    HKEY..\..\..\..{RegistryKeys}SOFTWARE\key-findSoftwareSoftware\Microsoft\Internet Explorer\DOMStorage\key-find.comSoftware\Microsoft\Internet Explorer\DOMStorage\www.key-find.comSOFTWARE\Wow6432Node\key-findSoftwareHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}key-find uninstaller
Posted: March 20, 2014 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Threat Metric
Threat Level: 5/10
Detection Count: 25,726

Leave a Reply

What is 13 + 5 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)