Amisites.com
Posted: June 21, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 3,145 |
---|---|
Threat Level: | 5/10 |
Infected PCs: | 62,621 |
First Seen: | June 21, 2016 |
---|---|
Last Seen: | October 16, 2023 |
OS(es) Affected: | Windows |
The amisites.com browser hijacker is almost identical to attirerpage.com and funcionapage, among other bogus websites that present themselves as alternative search engines that will enhance your browsing experience and generate the most relevant search results. Meanwhile, all the searches that you make through them are redirected through Google and the main thing that amisites.com 'enhances' is the amount of annoying and irrelevant ads that are presented to you. Amisites.com also can be a compromise to certain private information.
The Amisites browser hijacker may get on your computer through dubious freeware installers that are programmed in a way that you will not even know what you are installing on your computer. The most common method is bundling. It relies on the users rushing through the installation of a program they downloaded and going past the additional software that is set to install in the 'Advanced' or 'Custom' sections of the installation process.
Once it gets your computer, the Amisites browser hijacker will begin making changes to your browser settings. Amisites targets the most common browsers, including Google Chrome, Mozilla Firefox, Internet Explorer, Microsoft Edge and Opera. The Amisites browser hijacker will change your homepage, new tab, browser shortcuts, and default search engine to amisites.com.
A good way to see if you are infected with the Amisites browser hijacker is to try and visit amisites.com. Users that aren't affected will usually get redirected to the Google's search platform. If amisites.com keeps coming up, however, you might be in trouble.
The Amisites browser hijacker may collect quite a lot of information about you and your browsing, including your IP address, search queries and website URLs that you have visited. This may cause serious privacy issues, as this data may be shared with third parties, which can misuse it to generate revenue, and even lead to identity theft.
Changing the browser settings will not help you, as they will be switched back to amisites.com quickly by the unsafe software. Uninstalling recently installed software might help you, but there's no guarantee that all the files and codes of the browser hijacker will be deleted. This is why you should avoid dubious bundles in the first place and rely on a legitimate detection and removal tool.
Technical Details
Registry Modifications
File name without pathhttp_www.amisites.com_0.localstoragehttp_www.amisites.com_0.localstorage-journalHKEY..\..\..\..{RegistryKeys}SOFTWARE\amisitesSoftwareSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\amisites.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.amisites.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\amisites.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.amisites.comSoftware\Microsoft\Internet Explorer\DOMStorage\amisites.comSoftware\Microsoft\Internet Explorer\DOMStorage\www.amisites.comSOFTWARE\Microsoft\Internet Explorer\LowRegistry\DOMStorage\amisites.comSOFTWARE\Microsoft\Internet Explorer\LowRegistry\DOMStorage\www.amisites.comSOFTWARE\Wow6432Node\amisitesSoftware
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.