Posted: March 20, 2014
Threat Metric
Threat Level: 5/10
Infected PCs 9,774 Description Screenshot is a search site that reroutes traffic to the Yahoo's search engine. Although such a minor misrepresentation of the site's purpose is no crime, malware researchers were unhappy to link the promotion of to attacks made by browser hijacks that may change your Web browser automatically. Since the corresponding browser issues affect both your browser's potential performance and its overall Web safety, contact with should be kept to a minimum, and removing hijackers, when needed, should use appropriate system-scanning utilities.

The Uncertain Browsers Benefits Opened Up by is a 'search' site without any actual Web-searching functions; visitors attempting to use this apparent feature may find themselves redirected to Yahoo Search with additional advertisements inserted by A recent campaign of browser-hijackings supports this attempt to cash-in on its traffic; a campaign that malware researchers found rising in incidents in the summer of 2014. Symptoms of typical browser hijacks may include:

  • Hijacked homepages may be set to load, irrespective of your original settings.
  • Web browsers may fail to respond to future changes in your homepage, search engine, default new tab or other settings.
  • Shortcuts for unrelated programs or websites may launch instead of their original targets, or in addition to them.

A small number of PC security companies also have classified as a corrupted website. However, malware experts have failed to find any unsafe content on – although that fact doesn't make visiting a good idea. hijackers avoid displaying components that would let their users remove them or disable them easily, and effectively are tantamount to low-level threats. Universally, hijackers also are installed automatically, which may indicate that other threats also have an interest in promoting

The Key to Ditching a Homepage

Besides being one of the most basic ways to deceive PC users into funneling traffic, and therefore profit, to its administrators, has little unique about Chrome users seem to be especially vulnerable to hijacks, which may indicate that the responsible software was copy-pasted from a similarly Chrome-exclusive program in the past. Regardless of that fact, any PC user who sees their browser loading automatically should run a scan on their computer with appropriate PC security solutions.

Typical reactions to browser-redirecting PUPs like's hijackers are to reset your browser's settings, reinstall the Web browser or just switch to a different browser. In all cases, these solutions may skirt the symptoms of a hijacker without removing the related program from your computer. Over time, the security issues of allowing Potentially Unwanted Programs to linger on your hard drive may turn into problems related to other PC threats, and malware experts see every reason to recommend the most comprehensive security tools available for deleting any similarly untrustworthy software. Screenshot Screenshot Screenshot 4

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:

amt_key-find.exe File name: amt_key-find.exe
Size: 886.25 KB (886256 bytes)
MD5: 6c190850765af53361a8e08f814767d6
Detection count: 67
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 20, 2014

Registry Modifications

The following newly produced Registry Values are:

File name without pathhttp_www.key-find.com_0.localstoragehttp_www.key-find.com_0.localstorage-journalHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}key-find uninstallRegistry keySOFTWARE\key-findSoftwareSoftware\Microsoft\Internet Explorer\DOMStorage\key-find.comSoftware\Microsoft\Internet Explorer\DOMStorage\www.key-find.comSOFTWARE\Wow6432Node\key-findSoftwareDirectory%APPDATA%\key-find

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.