AdminBot | 09.12.2013 13:54 | Nationzoom.com Browser Hijacker entfernen Nationzoom.com Browser Hijacker entfernen Was ist Nationzoom.com Browser Hijacker?
Nationzoom.com Browser Hijacker ist eine weitere Rogue-Malware in Form einer gefälschten Scan-Software, die mittels eines sog. Trojaners in den PC eindringt und dem Benutzer weissmacht, den PC nach Malware abzusuchen. Diese Software (Nationzoom.com Browser Hijacker) ist ein Fake und selbst eine Schadsoftware und sollte nicht gekauft werden.
Da solche Software wie Nationzoom.com Browser Hijacker sich gegen jede Entfernung wehren wird und Nationzoom.com Browser Hijacker oftmals noch Rootkits mitinstalliert, sollte eine Neuinstallation des Systems in Erwägung gezogen werden.
Verbreitet wird Scareware wie Nationzoom.com Browser Hijacker nicht mehr ausschliesslich über 'dubiose Seiten' für Cracks, KeyGens und Warez, sondern auch seriöse Seiten werden zunehmend für die Verbreitung dieser mißbraucht ( http://www.trojaner-board.de/90880-d...tallation.html).
Der wichtigste Schutz vor einer Infizierung ist ein aktuelles Windows (mit allen Updates) und aktuelle Drittanbietersoftware wie Java oder Adobe Flash! http://img.trojaner-board.de/nationz...hijacker/1.jpg Symptome von Nationzoom.com Browser Hijacker:- ständige Fake Virenmeldungen von Nationzoom.com Browser Hijacker
- PC läuft seit Nationzoom.com Browser Hijacker langsamer als üblich
Fake-Meldungen von Nationzoom.com Browser Hijacker: Dateien von Nationzoom.com Browser Hijacker: Code:
%CommonAppData%WPM
%CommonAppData%WPMupdate
%CommonAppData%WPMwprotectmanager.exe
c:Program FilesMozilla Firefoxsearchpluginsnationzoom.xml
File Location Notes:%CommonAppData% refers to the Application Data folder for the All Users Profile. By default, this is C:Documents and SettingsAll UsersApplication Data for Windows 2000/XP and C:ProgramData in Windows Vista, Windows 7, and Windows 8.%CommonAppData% refers to the Application Data folder in the All Users profile. For Windows XP, Vista, NT, 2000 and 2003 it refers to C:Documents and SettingsAll UsersApplication Data, and for Windows Vista, Windows 7, and Windows 8 it is C:ProgramData. Registry-Einträge von Nationzoom.com Browser Hijacker: Code:
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerSearchScopes{33BB0A4E-99AF-4226-BDF6-49120163DE86}
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSearchScopes{33BB0A4E-99AF-4226-BDF6-49120163DE86}
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallWPM
HKEY_LOCAL_MACHINESOFTWAREnationzoomSoftware
HKEY_LOCAL_MACHINESOFTWAREsupWPM
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWpm
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain "Default_Page_URL" = "http://www.nationzoom.com/?type=hp&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerTabbedBrowsing "NewTabPageShow" = "1"
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain "Start Page" = "http://www.nationzoom.com/?type=hp&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerSearchScopes "DefaultScope" = "{33BB0A4E-99AF-4226-BDF6-49120163DE86}"
HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetFIREFOX.EXEshellopencommand "(Default)" = "C:Program FilesMozilla Firefoxfirefox.exe http://www.nationzoom.com/?type=sc&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetGoogle Chromeshellopencommand "(Default)" = "C:Documents and SettingstestLocal SettingsApplication DataGoogleChromeApplicationchrome.exe" http://www.nationzoom.com/?type=sc&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetIEXPLORE.EXEshellopencommand "(Default)" = "C:Program FilesInternet Exploreriexplore.exe http://www.nationzoom.com/?type=sc&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetOperashellopencommand "(Default)" = ""C:Program FilesOperaOpera.exe" http://www.nationzoom.com/?type=sc&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetOpera.exeshellopencommand "(Default)" = ""C:Program FilesOperaOpera.exe" http://www.nationzoom.com/?type=sc&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetSafari.exeshellopencommand "(Default)" = ""C:Program FilesSafariSafari.exe" http://www.nationzoom.com/?type=sc&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_LOCAL_MACHINESOFTWAREClientsStartMenuInternetSEAMONKEY.EXEshellopencommand "(Default)" = "C:Program FilesSeaMonkeyseamonkey.exe http://www.nationzoom.com/?type=sc&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerMain "Default_Page_URL" = "http://www.nationzoom.com/?type=hp&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerMain "Default_Search_URL" = "http://www.nationzoom.com/web/?type=ds&ts=<timestamp>&from=tugs&uid=<hard drive id>&q={searchTerms}"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerMain "Search Page" = "http://www.nationzoom.com/web/?type=ds&ts=<timestamp>&from=tugs&uid=<hard drive id>&q={searchTerms}"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerMain "Start Page" = "http://www.nationzoom.com/?type=hp&ts=<timestamp>&from=tugs&uid=<hard drive id>"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSearch "CustomizeSearch" = "http://www.nationzoom.com/web/?type=ds&ts=<timestamp>&from=tugs&uid=<hard drive id>&q={searchTerms}"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSearch "SearchAssistant" = "http://www.nationzoom.com/web/?type=ds&ts=<timestamp>&from=tugs&uid=<hard drive id>&q={searchTerms}"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSearchScopes "DefaultScope" = "{33BB0A4E-99AF-4226-BDF6-49120163DE86}" Nationzoom.com Browser Hijacker im HijackThis-Log: Code:
R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.nationzoom.com/?type=hp&ts=<timestamp>&from=tugs&uid=<hard drive id>
R0 - HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.nationzoom.com/?type=hp&ts=<timestamp>&from=tugs&uid=<hard drive id>
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.nationzoom.com/?type=hp&ts=<timestamp>&from=tugs&uid=<hard drive id>
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://www.nationzoom.com/web/?type=ds&ts=<timestamp>&from=tugs&uid=<hard drive id>&q={searchTerms}
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page = http://www.nationzoom.com/web/?type=ds&ts=<timestamp>&from=tugs&uid=<hard drive id>&q={searchTerms}
R0 - HKLMSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.nationzoom.com/?type=hp&ts=<timestamp>&from=tugs&uid=<hard drive id>
R0 - HKLMSoftwareMicrosoftInternet ExplorerSearch,SearchAssistant = http://www.nationzoom.com/web/?type=ds&ts=<timestamp>&from=tugs&uid=<hard drive id>&q={searchTerms}
R0 - HKLMSoftwareMicrosoftInternet ExplorerSearch,CustomizeSearch = http://www.nationzoom.com/web/?type=ds&ts=<timestamp>&from=tugs&uid=<hard drive id>&q={searchTerms}
O23 - Service: Wpm Service (Wpm) - Cherished Technololgy LIMITED - %CommonAppData%WPMwprotectmanager.exe |