bestfriends clean up annoyance

I had the bestfriends trojan/virus, and removed it (what I believed to be successfully). I have had no ill effects thereafter whatsoever, except***


I can't drag and drop files (anywhere) anymore.

At first, it allowed me to "drag" them, but upon dropping, they would not in fact be moved. After trying some fixes from other sources (nothing major), files now won't even allow dragging: they stay put and the cursor becomes a circle w/ slash.

Here is my log

Logfile of HijackThis v1.99.0
Scan saved at 6:12:18 PM, on 2/12/2005
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\System32\ibmpmsvc.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\Program Files\NavNT\defwatch.exe
C:\WINNT\runservice.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\system32\ZoneLabs\vsmon.exe
C:\WINNT\wanmpsvc.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\System32\mspmspsv.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\MsgSys.EXE
C:\WINNT\Explorer.EXE
C:\WINNT\system32\RunDll32.exe
C:\WINNT\LTSMMSG.exe
C:\PROGRA~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe
C:\WINNT\system32\PRPCUI.exe
C:\WINNT\system32\tp4serv.exe
C:\Program Files\NavNT\vptray.exe
C:\WINNT\system32\AEIWLSTA.EXE
C:\PROGRA~1\VERIZO~1\SUPPOR~1\SMARTB~1\MotiveSB.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Winamp\winamp.exe
C:\Program Files\ThinkPad\PkgMgr\HOTKEY\TPONSCR.exe
C:\Program Files\SSH Communications Security\SSH Secure Shell\SshClient.exe
C:\Documents and Settings\Administrator\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://cgi.verizon.net/bookmarks/bmredir.asp?region=all&bw=dsl&cd=5.1.5&bm=ho_search
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://cgi.verizon.net/bookmarks/bmredir.asp?region=all&bw=dsl&cd=5.1.5&bm=ho_home
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Verizon Online
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [BMMGAG] RunDll32 C:\PROGRA~1\ThinkPad\UTILIT~1\pwrmonit.dll,StartPwrMonitor
O4 - HKLM\..\Run: [LTSMMSG] LTSMMSG.exe
O4 - HKLM\..\Run: [TPHOTKEY] C:\PROGRA~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe
O4 - HKLM\..\Run: [PRPCMonitor] PRPCUI.exe
O4 - HKLM\..\Run: [TrackPointSrv] tp4serv.exe
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [AEIWLSTA.EXE] AEIWLSTA.EXE
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\SUPPOR~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKCU\..\Run: [SFP] C:\Program Files\Common Files\Verizon Online\SFP\vzSFPWin.EXE /s
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINNT\system32\Msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINNT\system32\Msjava.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINNT\system32\Shdocvw.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://*.windowsupdate.com
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061001/housecall.trendmicro.com/housecall/xscan53.cab
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: Logical Disk Manager Administrative Service - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: IBM PM Service - Unknown - C:\WINNT\System32\ibmpmsvc.exe
O23 - Service: LicCtrl Service - Unknown - C:\WINNT\runservice.exe
O23 - Service: Norton AntiVirus Client - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: TrueVector Internet Monitor - Zone Labs LLC - C:\WINNT\system32\ZoneLabs\vsmon.exe
O23 - Service: WAN Miniport (ATW) Service - America Online, Inc. - C:\WINNT\wanmpsvc.exe

I have removed everything that shows up on adaware, spybot, etc. I have searched through my comp for the files listed on the main removal page. I have uninstalled wild tangent and viewpoint. I think (I might be wrong) that nothing malicious *remains* on my computer, but that some settings that were changed by the malware have not been changed back. Any help would be appreciated. (I have searched quite a bit for anyone else having drag/drop problems related to bestfriends, but I couldn't find anything.) :(

Thanks in advance.

Comments

  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited February 2005
    There's nothing bad in your log. I don't think your problem is related to spyware. Look at the drivers for your hardware, in particular your mouse/pointer driver.
  • edited February 2005
    I have reinstalled all the relevant drivers.

    I found, however, 4 interesting files in my c:\ directory:

    x.bat, which contains:
    @echo off

    REGEDIT.EXE /S kans.reg

    trufkz.html

    REGEDIT.EXE /S kansup.reg

    exit

    the aforementioned html file, which I have since deleted.

    the two .reg files.

    Here is their contents:

    kans.reg:
    Windows Registry Editor Version 5.00

    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0]
    "CurrentLevel"=dword:00000001
    "Flags"=dword:00000001
    "1001"=dword:00000000
    "1004"=dword:00000000
    "1200"=dword:00000000
    "1201"=dword:00000000
    "1206"=dword:00000000
    "1400"=dword:00000000
    "1402"=dword:00000000
    "1405"=dword:00000000
    "1406"=dword:00000000
    "1407"=dword:00000000
    "1601"=dword:00000000
    "1604"=dword:00000000
    "1605"=dword:00000000
    "1606"=dword:00000000
    "1607"=dword:00000000
    "1608"=dword:00000000
    "1609"=dword:00000000
    "1800"=dword:00000000
    "1802"=dword:00000000
    "1803"=dword:00000000
    "1804"=dword:00000000
    "1805"=dword:00000000
    "1A00"=dword:00000000
    "1A02"=dword:00000000
    "1A03"=dword:00000000
    "1A04"=dword:00000000
    "1A05"=dword:00000000
    "1A06"=dword:00000000
    "1A10"=dword:00000000
    "2001"=dword:00000000
    "2004"=dword:00000000

    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
    "CurrentLevel"=dword:00000001
    "Flags"=dword:00000001
    "1001"=dword:00000000
    "1004"=dword:00000000
    "1200"=dword:00000000
    "1201"=dword:00000000
    "1206"=dword:00000000
    "1400"=dword:00000000
    "1402"=dword:00000000
    "1405"=dword:00000000
    "1406"=dword:00000000
    "1407"=dword:00000000
    "1601"=dword:00000000
    "1604"=dword:00000000
    "1605"=dword:00000000
    "1606"=dword:00000000
    "1607"=dword:00000000
    "1608"=dword:00000000
    "1609"=dword:00000000
    "1800"=dword:00000000
    "1802"=dword:00000000
    "1803"=dword:00000000
    "1804"=dword:00000000
    "1805"=dword:00000000
    "1A00"=dword:00000000
    "1A02"=dword:00000000
    "1A03"=dword:00000000
    "1A04"=dword:00000000
    "1A05"=dword:00000000
    "1A06"=dword:00000000
    "1A10"=dword:00000000
    "2001"=dword:00000000
    "2004"=dword:00000000


    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0]
    "CurrentLevel"=dword:00000001
    "Flags"=dword:00000001
    "1001"=dword:00000000
    "1004"=dword:00000000
    "1200"=dword:00000000
    "1201"=dword:00000000
    "1206"=dword:00000000
    "1400"=dword:00000000
    "1402"=dword:00000000
    "1405"=dword:00000000
    "1406"=dword:00000000
    "1407"=dword:00000000
    "1601"=dword:00000000
    "1604"=dword:00000000
    "1605"=dword:00000000
    "1606"=dword:00000000
    "1607"=dword:00000000
    "1608"=dword:00000000
    "1609"=dword:00000000
    "1800"=dword:00000000
    "1802"=dword:00000000
    "1803"=dword:00000000
    "1804"=dword:00000000
    "1805"=dword:00000000
    "1A00"=dword:00000000
    "1A02"=dword:00000000
    "1A03"=dword:00000000
    "1A04"=dword:00000000
    "1A05"=dword:00000000
    "1A06"=dword:00000000
    "1A10"=dword:00000000
    "2001"=dword:00000000
    "2004"=dword:00000000

    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3]
    "CurrentLevel"=dword:00000001
    "Flags"=dword:00000001
    "1001"=dword:00000000
    "1004"=dword:00000000
    "1200"=dword:00000000
    "1201"=dword:00000000
    "1206"=dword:00000000
    "1400"=dword:00000000
    "1402"=dword:00000000
    "1405"=dword:00000000
    "1406"=dword:00000000
    "1407"=dword:00000000
    "1601"=dword:00000000
    "1604"=dword:00000000
    "1605"=dword:00000000
    "1606"=dword:00000000
    "1607"=dword:00000000
    "1608"=dword:00000000
    "1609"=dword:00000000
    "1800"=dword:00000000
    "1802"=dword:00000000
    "1803"=dword:00000000
    "1804"=dword:00000000
    "1805"=dword:00000000
    "1A00"=dword:00000000
    "1A02"=dword:00000000
    "1A03"=dword:00000000
    "1A04"=dword:00000000
    "1A05"=dword:00000000
    "1A06"=dword:00000000
    "1A10"=dword:00000000
    "2001"=dword:00000000
    "2004"=dword:00000000

    kansup.reg:

    Windows Registry Editor Version 5.00

    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0]
    "1001"=dword:00000004
    "1004"=dword:00000004
    "1200"=dword:00000004
    "1201"=dword:00000004
    "1206"=dword:00000004
    "1400"=dword:00000004
    "1402"=dword:00000004
    "1405"=dword:00000004
    "1406"=dword:00000004
    "1407"=dword:00000004
    "1601"=dword:00000004
    "1604"=dword:00000004
    "1605"=dword:00000004
    "1606"=dword:00000004
    "1607"=dword:00000004
    "1608"=dword:00000004
    "1609"=dword:00000004
    "1800"=dword:00000004
    "1802"=dword:00000004
    "1803"=dword:00000004
    "1804"=dword:00000004
    "1805"=dword:00000004
    "1A00"=dword:00000004
    "1A02"=dword:00000004
    "1A03"=dword:00000004
    "1A04"=dword:00000004
    "1A05"=dword:00000004
    "1A06"=dword:00000004
    "1A10"=dword:00000004
    "2001"=dword:00000004
    "2004"=dword:00000004

    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
    "1001"=dword:00000004
    "1004"=dword:00000004
    "1200"=dword:00000004
    "1201"=dword:00000004
    "1206"=dword:00000004
    "1400"=dword:00000004
    "1402"=dword:00000004
    "1405"=dword:00000004
    "1406"=dword:00000004
    "1407"=dword:00000004
    "1601"=dword:00000004
    "1604"=dword:00000004
    "1605"=dword:00000004
    "1606"=dword:00000004
    "1607"=dword:00000004
    "1608"=dword:00000004
    "1609"=dword:00000004
    "1800"=dword:00000004
    "1802"=dword:00000004
    "1803"=dword:00000004
    "1804"=dword:00000004
    "1805"=dword:00000004
    "1A00"=dword:00000004
    "1A02"=dword:00000004
    "1A03"=dword:00000004
    "1A04"=dword:00000004
    "1A05"=dword:00000004
    "1A06"=dword:00000004
    "1A10"=dword:00000004
    "2001"=dword:00000004
    "2004"=dword:00000004


    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0]
    "1001"=dword:00000004
    "1004"=dword:00000004
    "1200"=dword:00000004
    "1201"=dword:00000004
    "1206"=dword:00000004
    "1400"=dword:00000004
    "1402"=dword:00000004
    "1405"=dword:00000004
    "1406"=dword:00000004
    "1407"=dword:00000004
    "1601"=dword:00000004
    "1604"=dword:00000004
    "1605"=dword:00000004
    "1606"=dword:00000004
    "1607"=dword:00000004
    "1608"=dword:00000004
    "1609"=dword:00000004
    "1800"=dword:00000004
    "1802"=dword:00000004
    "1803"=dword:00000004
    "1804"=dword:00000004
    "1805"=dword:00000004
    "1A00"=dword:00000004
    "1A02"=dword:00000004
    "1A03"=dword:00000004
    "1A04"=dword:00000004
    "1A05"=dword:00000004
    "1A06"=dword:00000004
    "1A10"=dword:00000004
    "2001"=dword:00000004
    "2004"=dword:00000004

    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3]
    "1001"=dword:00000004
    "1004"=dword:00000004
    "1200"=dword:00000004
    "1201"=dword:00000004
    "1206"=dword:00000004
    "1400"=dword:00000004
    "1402"=dword:00000004
    "1405"=dword:00000004
    "1406"=dword:00000004
    "1407"=dword:00000004
    "1601"=dword:00000004
    "1604"=dword:00000004
    "1605"=dword:00000004
    "1606"=dword:00000004
    "1607"=dword:00000004
    "1608"=dword:00000004
    "1609"=dword:00000004
    "1800"=dword:00000004
    "1802"=dword:00000004
    "1803"=dword:00000004
    "1804"=dword:00000004
    "1805"=dword:00000004
    "1A00"=dword:00000004
    "1A02"=dword:00000004
    "1A03"=dword:00000004
    "1A04"=dword:00000004
    "1A05"=dword:00000004
    "1A06"=dword:00000004
    "1A10"=dword:00000004
    "2001"=dword:00000004
    "2004"=dword:00000004


    I have a feeling that the changes they made were malicious. I know that some variants of the trojan change the internet security settings so that you cannot download things from IE, etc. I don't know if this ever happened, since I use Firefox anyhow. At any rate, these reg files concern me. (My hijackthis log remains clean.)

    Any thoughts?
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited February 2005
    Download and run this tool.
    http://www.jayloden.com/AIMFix.exe



    Please run these two online scans.
    Make sure they are set to clean automatically:

    http://housecall.trendmicro.com/

    http://www.pandasoftware.com/activescan/com/activescan_principal.htm

    If there are files that can not be removed by the scans please include that information in your next post.



    Reboot and post a new hijackthis log.
  • edited February 2005
    I have ran the AIMFix several times, at various stages, in the past few days. It hasn't found anything since the first time it ran. I have ran the housecall twice as well, and it found nothing. NAV has never found anything either.

    I also have ran SpyBot and AdAware, which only found the occasional cookie, etc. At any rate, all that they found have since been deleted.

    I am running the panda scan now. I will report back later. Thanks for the advice.
  • edited February 2005
    Ok, panda came up with 2 things:


    Virus:W32/Gaobot.batch Disinfected
    C:\Documents and Settings\Administrator\Local Settings\Temp\r.bat

    Adware:Adware/MediaTickets No disinfected C:\Install.exe[trufkz.html]

    The second one I have renamed and moved to a temp folder. Notice that the html file it extracts is the html file mentioned earlier. At any rate, all related files are now renamed and in a separate folder.

    NAV had an update today. So I reran that. None of these (AdAware, SpyBot, Panda, housecall, NAV, etc.) have mentioned anything about the x.bat and the two .reg files in C:\. :(

    It looks rather like the two reg files are changing the internet security/privacy settings, however,

    1.) I am not sure of that
    2.) I have already reset these to default, and this hasn't fixed my main problem (drag/drop).

    I have a feeling that the problem I am having is not of current infection, but the lingering effect of a now-gone malware. I suppose I could have posted this to the software forum, but I was hoping someone else had had the same problem when battling bestfriends.

    New hijackthis log:

    Logfile of HijackThis v1.99.0
    Scan saved at 2:31:02 PM, on 2/16/2005
    Platform: Windows 2000 SP4 (WinNT 5.00.2195)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINNT\System32\smss.exe
    C:\WINNT\system32\winlogon.exe
    C:\WINNT\system32\services.exe
    C:\WINNT\system32\lsass.exe
    C:\WINNT\System32\ibmpmsvc.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\System32\svchost.exe
    C:\WINNT\system32\spoolsv.exe
    C:\Program Files\NavNT\defwatch.exe
    C:\WINNT\runservice.exe
    C:\Program Files\NavNT\rtvscan.exe
    C:\WINNT\system32\regsvc.exe
    C:\WINNT\system32\MSTask.exe
    C:\WINNT\system32\ZoneLabs\vsmon.exe
    C:\WINNT\wanmpsvc.exe
    C:\WINNT\System32\WBEM\WinMgmt.exe
    C:\WINNT\System32\mspmspsv.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\Explorer.EXE
    C:\WINNT\system32\MsgSys.EXE
    C:\WINNT\system32\RunDll32.exe
    C:\WINNT\LTSMMSG.exe
    C:\PROGRA~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe
    C:\WINNT\system32\PRPCUI.exe
    C:\WINNT\system32\tp4serv.exe
    C:\Program Files\NavNT\vptray.exe
    C:\WINNT\system32\AEIWLSTA.EXE
    C:\PROGRA~1\VERIZO~1\SUPPOR~1\SMARTB~1\MotiveSB.exe
    C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    C:\Documents and Settings\Administrator\Desktop\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://cgi.verizon.net/bookmarks/bmredir.asp?region=all&bw=dsl&cd=5.1.5&bm=ho_search
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://cgi.verizon.net/bookmarks/bmredir.asp?region=all&bw=dsl&cd=5.1.5&bm=ho_home
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Verizon Online
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
    O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
    O4 - HKLM\..\Run: [BMMGAG] RunDll32 C:\PROGRA~1\ThinkPad\UTILIT~1\pwrmonit.dll,StartPwrMonitor
    O4 - HKLM\..\Run: [LTSMMSG] LTSMMSG.exe
    O4 - HKLM\..\Run: [TPHOTKEY] C:\PROGRA~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe
    O4 - HKLM\..\Run: [PRPCMonitor] PRPCUI.exe
    O4 - HKLM\..\Run: [TrackPointSrv] tp4serv.exe
    O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
    O4 - HKLM\..\Run: [AEIWLSTA.EXE] AEIWLSTA.EXE
    O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\SUPPOR~1\SMARTB~1\MotiveSB.exe
    O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKCU\..\Run: [SFP] C:\Program Files\Common Files\Verizon Online\SFP\vzSFPWin.EXE /s
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINNT\system32\Msjava.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINNT\system32\Msjava.dll
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINNT\system32\Shdocvw.dll
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://*.windowsupdate.com
    O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061001/housecall.trendmicro.com/housecall/xscan53.cab
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
    O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
    O23 - Service: Logical Disk Manager Administrative Service - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
    O23 - Service: IBM PM Service - Unknown - C:\WINNT\System32\ibmpmsvc.exe
    O23 - Service: LicCtrl Service - Unknown - C:\WINNT\runservice.exe
    O23 - Service: Norton AntiVirus Client - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
    O23 - Service: TrueVector Internet Monitor - Zone Labs LLC - C:\WINNT\system32\ZoneLabs\vsmon.exe
    O23 - Service: WAN Miniport (ATW) Service - America Online, Inc. - C:\WINNT\wanmpsvc.exe
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited February 2005
    I've never experienced someone having a problem with drag/drop that is related to malware. That doesn't mean that it's not, but I haven't seen it take that effect. With all of your scans coming up clean and your hijackthis log looks clean, I don't think there's anything else I can do for you.
  • edited March 2005
    I found this post because I was having a virus problem very much like yours(same files involved).

    What I'm posting about though is your drag/drop problem. I had the very same problem when I was running Windows 98 SE a year ago. I don't know how or when it started. My dad suggested I run the Windows File Checker that was in System Information in the System Tools folder. It found errors in some files and fixed the problem. I don't know if that's an option for you with Windows 2000 though, but I thought I'd suggest this in case it helps.

    Also, a big thanks to whoever posted the link for Aimfix.
  • edited March 2005
    Thanks for the reply.

    I finally solved the drag/drop issue on my own. I indeed tried a sfc, but it didn't fix the problem. What happened was kinda strange, and perhaps someone here can better explain what it is that happened. Basically, "My Computer" was added as an Internet Zone, with all options for it greyed out. I didn't notice this at first, since I presumed it had always been there. At any rate, I did a repair of IE. After the repair, all worked fine, and I noticed that "My Computer" was no longer included as an "Internet Zone".

    Someone did try to explain it to me briefly. They said that with My Computer placed there, the ActiveX controls/permissions were in control of what I could/couldn't do on my desktop/through explorer. I don't understand ActiveX, so I didn't pay much attention to it. *shrug*
Sign In or Register to comment.