Home Malware Programs Browser Hijackers FrontHomePagez.com

FrontHomePagez.com

Posted: December 11, 2008

FrontHomePagez.com is a rogue website and browser hijacker that promotes the phony AntivirusTrigger and VirusTrigger programs. Fronthomepagez.com belongs to the Trojan.Zlob family and is installed onto your PC without your knowledge by the Zlob Trojan which comes bundled with shareware downloads, fake video codecs or infected pdf files. FrontHomePagez.com displays the following fake alert pop up:

"Warning! W32.Myzor.FK@yf is a virus that infects files with .exe extensions. It attempts to steal passwords and private information from the infected computer."

If you click on the pop up, you will be redirected to a rogue site where they will promote the bogus AntivirusTrigger and VirusTrigger programs to get rid of the non-existing infection. Do NOT purchase the fraudulent AntivirusTrigger and VirusTrigger programs. Don't trust the warning and don't trust the rogue site. The only infection that your PC has is the trojan associated with FrontHomePagez.com.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 duzakwq.dll
    2 gtawclv.dll
    3 icmntr.exe
    4 icthis.exe
    5 ictun.exe
    6 icun.exe
    7 isfmm.exe
    8 isfmntr.exe
    9 isfun.exe
    10 Online Security Guide.url
    11 pmmon.exe
    12 pmuninst.exe
    13 Security Troubleshooting.url
    14 spwoqbmv.exe
    15 xbaqktfv.exe
    16 zafhemm.dll

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{70d17a5f-ef27-4295-90f5-20ad6f24834f}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D61D7E1A-6613-49CA-B6F9-51DB248E209D}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{aa6d4f53-4c8d-4549-84d2-02d584acc4e9}HKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}IExplorer Security Plug-inInternet Explorer Secure Bar
  • The following CLSID's were detected:
    HKEY..\..\{CLSID Path}2f199d0e-f3e7-41a7-a060-816c24cceea0c96395b8-ab09-46a4-b539-7ddf6e0618080ba3e00d-b660-46e6-a2db-2672ee82dc98e3623691-f85d-48d8-8e4d-abe79077f841ba934431-76af-4c99-93c2-c3d21944a72e
Loading...