My MS IE v6.0 browser has been hijacked

  • Thread starter Thread starter browserquestions
  • Start date Start date
B

browserquestions

When I visit www.bankofamerica.com, there is an additional field
"Enter ATM card number:"
When I visit www.wellsfargo.com, there is an additional field for "ATM
PIN"

These fields don't appear when I use Mozilla Firefox v3.0

I've reported the problem to the respective banks.

Ad-Aware (free) , Spybot and Windows Defender don't detect this hijack

Can someone here help me identify who/what hijacked my IE 6 browser,
and how I can find out which illegal IP address these 2 fields are
being transmitted to?
 
When I visit www.bankofamerica.com, there is an additional field
"Enter ATM card number:"
When I visit www.wellsfargo.com, there is an additional field for "ATM
PIN"

These fields don't appear when I use Mozilla Firefox v3.0

I've reported the problem to the respective banks.

Ad-Aware (free) , Spybot and Windows Defender don't detect this hijack

Can someone here help me identify who/what hijacked my IE 6 browser,
and how I can find out which illegal IP address these 2 fields are
being transmitted to?

1.Clear the (IE) temporary Internet files and the history cache.
Click Start==>Run... then type (or copy/paste) "inetcpl.cpl" (w/out
quotation marks) into the box, then click the 'OK' button.
In Internet Properties panel 'General' tab, under 'Browsing history', click
'Delete...'button, in 'Delete Browsing History' panel, click the 'Delete
all...'button then place a checkmark into the box beside 'Also delete files
and settings stored by add-ons', Click 'Yes' and exit the Internet
Properties panel by clicking the 'OK' button.

2.Clean HDD
Click Start==>Run... then type (or copy/paste) "cleanmgr" (w/out quotation
marks into the box, then click the 'OK' button. Select your drive
(presumably WinXP (C:) and click OK.

3.Download/execute:
Malwarebytes© Corporation - Anti-Malware
http://www.malwarebytes.org/mbam/program/mbam-setup.exe
--and--
SuperAntispyware - Free
http://www.superantispyware.com/superantispywarefreevspro.html

After the software is updated, it is suggested scanning the system in Safe
Mode.

4.Download and execute HiJack This! (HJT)
http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis

Please, do not post HJT logs to this newsgroup.
Fora where you can get expert advice for HiJack This! (HJT) logs.

http://www.thespykiller.co.uk/index.php?board=3.0
http://www.spywarewarrior.com/viewforum.php?f=5
http://forums.tomcoyote.org/index.php?showforum=27
http://www.bleepingcomputer.com/forums/forum22.html
http://www.malwarebytes.org/forums/index.php?showforum=7
http://www.5starsupport.com/ipboard/index.php?showforum=18
http://www.theeldergeek.com/forum/index.php?s=2e9ea4e19d3289dd877ab75a8220bff6&showforum=29

NOTE:
Registration is required in any of the above mentioned fora before posting
a HJT log and read the 'stickies' (instructions/guidelines) for the
respective HJT forum.

5.Routinely practice Safe-Hex.
http://www.claymania.com/safe-hex.html

Good luck :)
 
Unexplained computer behavior may be caused by deceptive software
http://support.microsoft.com/kb/827315

Run a /thorough/ check for hijackware, including posting your hijackthis log
to an appropriate forum.

Checking for/Help with Hijackware
http://aumha.org/a/parasite.htm
http://aumha.org/a/quickfix.htm
http://aumha.net/viewtopic.php?t=5878
http://wiki.castlecops.com/Malware_Removal_and_Prevention:_Introduction
http://mvps.org/winhelp2002/unwanted.htm
http://inetexplorer.mvps.org/data/prevention.htm
http://inetexplorer.mvps.org/tshoot.html
http://www.mvps.org/sramesh2k/Malware_Defence.htm
http://defendingyourmachine2.blogspot.com/
http://www.elephantboycomputers.com/page2.html#Removing_Malware

When all else fails, HijackThis v2.0.2
(http://aumha.org/downloads/hijackthis.exe) is the preferred tool to use (in
conjunction with some other utilities). HijackThis will NOT fix anything on
its own, but it will help you to both identify and remove any
hijackware/spyware with assistance from an expert. **Post your log to
http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,
http://forums.spybot.info/forumdisplay.php?f=22,
http://aumha.net/viewforum.php?f=30, or another appropriate forum for review
by an expert in such matters, not here.**

If the procedures look too complex - and there is no shame in admitting this
isn't your cup of tea - take the machine to a local, reputable and
independent (i.e., not BigBoxStoreUSA or Geek Squad) computer repair shop.
 
When I visit www.bankofamerica.com, there is an additional field
"Enter ATM card number:"
When I visit www.wellsfargo.com, there is an additional field for "ATM
PIN"

These fields don't appear when I use Mozilla Firefox v3.0

I've reported the problem to the respective banks.

Ad-Aware (free) , Spybot and Windows Defender don't detect this hijack

Can someone here help me identify who/what hijacked my IE 6 browser,
and how I can find out which illegal IP address these 2 fields are
being transmitted to?


If you use IE6 you deserve to have your legs cut off, not only hijacked.

Gaz
 
1.Clear the (IE) temporary Internet files and the history cache.
Click Start==>Run... then type (or copy/paste) "inetcpl.cpl" (w/out
quotation marks) into the box, then click the 'OK' button.
In Internet Properties panel 'General' tab, under 'Browsing history', click
'Delete...'button, in 'Delete Browsing History' panel, click the 'Delete
all...'button then place a checkmark into the box beside 'Also delete files
and settings stored by add-ons', Click 'Yes' and exit the Internet
Properties panel by clicking the 'OK' button.

2.Clean HDD
Click Start==>Run... then type (or copy/paste) "cleanmgr" (w/out quotation
marks into the box, then click the 'OK' button. Select your drive
(presumably WinXP (C:) and click OK.

3.Download/execute:
Malwarebytes© Corporation - Anti-Malwarehttp://www.malwarebytes.org/mbam/program/mbam-setup.exe
--and--
SuperAntispyware - Freehttp://www.superantispyware.com/superantispywarefreevspro.html

After the software is updated, it is suggested scanning the system in Safe
Mode.

4.Download and execute HiJack This! (HJT)http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis

Please, do not post HJT logs to this newsgroup.
Fora where you can get expert advice for HiJack This! (HJT) logs.

http://www.thespykiller.co.uk/index...com/forum/index.php?s=2e9ea4e19d3289dd877ab75...

NOTE:
Registration is required in any of the above mentioned fora before posting
a HJT log and read the 'stickies' (instructions/guidelines) for the
respective HJT forum.

5.Routinely practice Safe-Hex.http://www.claymania.com/safe-hex.html

Good luck :)

Thanks!

Malwarebytes found 6 backdoor bots and some infected files:
svchost.exe, twext.exe
that the other spyware tools missed.
My IE 6 browser is back to normal now.
 
Malwarebytes found 6 backdoor bots and some infected files:
svchost.exe, twext.exe
that the other spyware tools missed.
My IE 6 browser is back to normal now.

But is the computer free of any/all hijackware?
 
Malwarebytes actually performs better in Normal Mode. :)

I thought it was preferable to do these thing (e.g. anti virus scans)
in Safe Mode to prevent stealth virii from going into stealth mode.
The only thing safer than the Safe Mode is to boot up from a WIN PE or
BART PE CD ?
 
(e-mail address removed) wrote:



But is the computer free of any/all hijackware?

The saga continues.

After the initial cleanup using Malwarebytes Anti-Malware and
SUPERAntiSpyware,
MBAM found an additional Trojan.Downloader in a system restore point.
Next day, it found
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
\iepinit_dlls (Spyware.Agent.H) -> Quarantined and deleted
successfully.
and C:\WINDOWS\system32\nvaux32.dll (Spyware.Agent.H)

Next day,
my Computer Associates AntiVirus v8 reported a couple of instances of:
Win32/Pruserinf.Y
on the infected laptop, and now also on a Desktop PC that was shared
via a network share!

I Installed avast! on the laptop, and during the initial boot up scan,
it found:
Win32:Zbot-ASN [Trj]
Win32:Invo [Cryp]

But now, CA anti-virus on the laptop crashes (conflict with avast! ?)

My laptop Firewall (ZoneAlarm free) reports outbound requests in the
middle of the night from strangely named .exe file from the Windows
\temp folder.

I've also upgrade the MSIE on the laptop to v7, but use Firefox v3 as
the default.

Is there something still hiding in the laptop, and generating all
these other trojans?
 
David said:
The saga continues.
After the initial cleanup using Malwarebytes Anti-Malware and
SUPERAntiSpyware,
MBAM found an additional Trojan.Downloader in a system restore point.
Next day, it found
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Windows \iepinit_dlls (Spyware.Agent.H) ->
Quarantined and deleted successfully.
and C:\WINDOWS\system32\nvaux32.dll (Spyware.Agent.H)
Next day,
my Computer Associates AntiVirus v8 reported a couple of instances
of: Win32/Pruserinf.Y
on the infected laptop, and now also on a Desktop PC that was shared
via a network share!
I Installed avast! on the laptop, and during the initial boot up
scan, it found:
Win32::Zbot-ASN [Trj]
Win32::Invo [Cryp]
But now, CA anti-virus on the laptop crashes (conflict with avast! ?)
My laptop Firewall (ZoneAlarm free) reports outbound requests in the
middle of the night from strangely named .exe file from the Windows
\temp folder.
I've also upgrade the MSIE on the laptop to v7, but use Firefox v3 as
the default.
Is there something still hiding in the laptop, and generating all
these other trojans?

You can have only one fully installed anti virus application
performing both "On Demand" and "On Access" scanning. You can't have
two.

You can however supplement that one fully installed anti virus
application with additional "On Demand" anti virus scanners. These
can be online scanners or command line scanners than run locally.

You are still infected. There should be NO applications running from
the TEMP folder. So if ZA is indicating there is "...outbound
requests in the
middle of the night from strangely named .exe file from the Windows
.\temp folder..." you still have a problem.

Start by uninstalling Avast and see if that corrects CA anti-virus.
[snip]

Shouldn't he shut off his System Restore since the virus(s) seem to be in
there and empty out his temp and TIF files?
Then shouldn't he run the detection programs again? Just curious, since I do
not have XP or Vista.
Thanks.
 
(e-mail address removed) wrote:



But is the computer free of any/all hijackware?

The saga continues.

After the initial cleanup using Malwarebytes Anti-Malware and
SUPERAntiSpyware,
MBAM found an additional Trojan.Downloader in a system restore point.
Next day, it found
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
\iepinit_dlls (Spyware.Agent.H) -> Quarantined and deleted
successfully.
and C:\WINDOWS\system32\nvaux32.dll (Spyware.Agent.H)

Next day,
my Computer Associates AntiVirus v8 reported a couple of instances of:
Win32/Pruserinf.Y
on the infected laptop, and now also on a Desktop PC that was shared
via a network share!

I Installed avast! on the laptop, and during the initial boot up scan,
it found:
Win32:Zbot-ASN [Trj]
Win32:Invo [Cryp]

But now, CA anti-virus on the laptop crashes (conflict with avast! ?)

My laptop Firewall (ZoneAlarm free) reports outbound requests in the
middle of the night from strangely named .exe file from the Windows
\temp folder.

I've also upgrade the MSIE on the laptop to v7, but use Firefox v3 as
the default.

Is there something still hiding in the laptop, and generating all
these other trojans?

Yes.
 
You are still infected.  There should be NO applications running from the TEMP folder.  So
if ZA is indicating there is "...outbound requests in the
middle of the night from strangely named .exe file from the Windows .\temp folder..."  you
still have a problem.

I use CCleaner on a very frequent basis.
Can't say the same for the other users of that laptop in the
household.

I am quite sure the temp folder(s) were empty.
I guess the default behavior for CC is not to remove temp files less
than 48 hours old.
Download and execute HiJack This! (HJT)http://www.trendsecure.com/portal/en-US/_download/HJTInstall.exe

Then post the contents of the HJT log in your post in one of the below expert forums...

I'll post the HiJack logs to one of those forums.

Thanks for your help.
 
David said:
Shouldn't he shut off his System Restore since the virus(s) seem to
be in there and empty out his temp and TIF files?
Then shouldn't he run the detection programs again? Just curious,
since I do not have XP or Vista.
Thanks.

As for the System Restore cache, No. Not until after the PC is
deemed to be clean. This way there is a fall back position if the
process of cleaning the PC goes bad. As for the TIF, changces are
the file handle is in use and it can't be manually deleted. The only
advantage is that when you dump the TIF and TEMP folders, you have
less files to scan and thus should be a little quicker.

Thanks for that info. I always wondered about that.
Buffalo
PS: I use Win98SE and Win2000Pro on a dual boot.
 
Back
Top