doginhispen/skitodayplease

Discussion in 'Malware Help (A Specialist Will Reply)' started by keywest928, Feb 3, 2008.

  1. keywest928

    keywest928 Private E-2

    Posting for my husband...
    A few days ago I started noticing in my IE7 history tab the following two entries:
    a.doginhispen/com
    b.skitodayplease/com

    When I clear out the history tab, they keep reappearing. Around this same time, IE explorer started to intermittently shutdown. I can log back on right away when it does this...but I'm starting to get a bad feeling about what's going on. I'm careful about where I surf, although a few day ago my wife went to a game website to print out some information. Hmmm.

    I've got Nod32 v3.0.612.0 on my system (Windows XP Pro SP2). My most recent scan of my hard drive was this morning. Nothing was detected. The settings are per Blackspeare's recent tutorial.

    I've never had a computer virus before...and have no clue what to do if that's what it is. Please help.
     
  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  3. keywest928

    keywest928 Private E-2

    TimW,

    We followed the malware directions. Attached are the logs we received (note that AVG Anti-Spyware identified Trackingcookie.ATDMT and Trackingcookie.Tribalfusion...and indicated one trace detected for each one...but when we clicked on the Report tab, it said no report was available). Lastly, please note that SpyBot reported finding the following two entries: DoubleClick and MediaPlex.

    I cleared my IE7 browser history. About 10 minutes later, the a.doginhispen.com and b.skitodayplease.com entries are showing up in the browser history again.

    What's next? (And, thanks...because we're pretty concerned and pretty lost.)
     

    Attached Files:

  4. keywest928

    keywest928 Private E-2

    TimW,
    I want to supplement my post from last night. There are three (not two) entries that reappeared again in my IE7 history tab after following your malware directions. They are:

    88.80.7.66
    a.doginhispen
    b.skitodayplease

    (My post from last night did not include the "88.80.7.66" entry.)
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Run C:\MGtools\analyse.exe by double clicking on it. This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://my.myway.com/ ---> Unless this actually is your start page!

    After clicking Fix, exit HJT.

    Now download The Avenger by Swandog46, and save it to your Desktop.

    * Extract avenger.exe from the Zip file and save it to your desktop
    * Run avenger.exe by double-clicking on it.
    * Check the 'Input script manually' box.
    * Click on the magnifying glass icon.
    * Copy everything in the Quote box below, and paste it in the box that opens:

    * Now click the 'Done' button.
    * Click on the traffic light icon and OK the prompt.
    * You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt

    After reboot look for all of the above files we had Avenger attempt to delete. If you still see them, delete them yourself.

    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it.

    Attach the new logs for:
    * c:\avenger.txt
    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  6. keywest928

    keywest928 Private E-2

    Tim: Just checking: did we do the first part right? I (Jennie) feel a little over my head here...I use a Mac; Dave is the windows guy, and he thinks I probably am responsible for infecting his computer, so I am helping (mostly reading directions and cheerleading) but it's confusing. And when things like the AVG not printing a report happen, we are left wondering if we did it right. I call Major Geeks up on the MacBook Pro and read the directions off while we "operate" on the PC. Have you seen these 3 items in browsers before?
    I cannot express how much we appreciate your help.
    Jennie
     
  7. keywest928

    keywest928 Private E-2

    TimW,

    Here's what we've done per your most recent post:

    We did not run C:|MGtools\analyse.exe because my understanding of your instructions said not to do it if myway.com is my home page for IE. (So to clarify, myway.com is my home page for IE.)

    We downloaded Avenger and ran it per your instructions. I'm not too familiar with the terminology, but after it ran, it looked like Notepad came up with a message saying it couldn't find Avenger text. So, we found the avenger.txt file, but it was empty. I tried repeatedly to attach it to this post (as you asked), but it won't. We had to manually delete C:\WINDOWS\system32\save$$updater and C:\WINDOWS\system32\(NULL).

    We ran CCleaner on all user accounts including the administrators account in safe mode per the protocol we followed yesterday.

    We ran the MGtools\GetLogs.bat file and we were successful in attaching it.

    Lastly, just before sending this post, I surfed a few minutes and the 88.80.7.66 entry in my IE7 History came back. (88.80.7.66 is one of the three I mention in a post to you this morning). No sign of the other two (a.doginhispen and b.skitodayplease) so far, but sometimes they show up a little afterwards.

    Thanks. Please hang in there with us. We need you!
     

    Attached Files:

  8. keywest928

    keywest928 Private E-2

    TimW,

    Just a quick update...
    I had to be out most of the evening. After I got back home a short time ago, I decided to log onto my computer and once again IE7 suddenly shutdown again (see our first post). I was able to immediately log back on.

    I hope I'm not being too wordy. Just trying to give you as much info as I can.
     
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download SUPERAntiSpyware and follow the below directions!
    • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    • An icon will be created on your desktop. Double-click that icon to launch the program.
    • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
      [*]Now physically unplug your cable to the internet (even if you have dial-up, unplug modem)
    • In SUPERAntiSpyware under "Configuration and Preferences", click the Preferences button.
    • Click the Scanning Control tab.
    • Under Scanner Options make sure the following are checked (leave all others unchecked):
      • Close browsers before scanning.
      • Scan for tracking cookies.
      • Terminate memory threats before quarantining.
    • Click the "Close" button to leave the control center screen.
    • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
    • On the left, make sure you check C:\Fixed Drive.
    • On the right, under "Complete Scan", choose Perform Complete Scan.
    • Click "Next" to start the scan. Please be patient while it scans your computer.
    • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
    • Make sure everything has a checkmark next to it and click "Next".
    • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
    • Click on the "Repairs" Tab. Click on "Repair broken Network Connection (WinSock LSP Chain)" and then click on "Perform Repair"
    • If asked if you want to reboot, click "Yes".
    • Reboot into normal Windows boot mode
    • To retrieve the removal information after reboot, launch SUPERAntispyware again.
      • Click Preferences, then click the Statistics/Logs tab.
      • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
      • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
      • Save the log somewhere you can locate it. We suggest using an informative filename like SASlog.txt
      • Please attach the Scan Log results to your next reply.
    • Click Close to exit the program.
    Download FindAWF and save the file to your Desktop
    Double-click FindAWF.exe to start the tool.
    Select Option 1 by pressing 1 and then Enter. The scan will start and a log will open (awf.txt)

    • Post back with with the contents of awf.tx
     
  10. keywest928

    keywest928 Private E-2

    TimW,
    We followed your latest instructions precisely. Attached are the two logs you requested. Please note the following two issues:

    This evening we noticed these entries in IE7 browser history: 88.80.7.66 and b.skitodayplease We'll clear them out of browser history (again) tonight.

    When running FindAWF.exe, ESET Nod32 displayed this window message:
    ! Object: C:\Documents & Settings\David\Desktop\Process.exe
    Threat: Win32/PRCView application
    Information: Cleaned by deleting - quarantined

    Can you answer two questions?
    1) Thus far, I've left all the downloads installed. Is this ok?
    2) I have taken no action on the above Eset quarantine message. How should I proceed with it?

    Much thanks for your continued help.
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You will have to disable the anti-virus when you run the AWF.exe...and keep all the downloaded programs as we will need to recheck the logs later.

    Start FindAWF.exe
    Select option 2 by pressing 2 and then Enter. A text file will open (files.txt).
    In that files.txt, copy and paste the following list of files to be restored:
    Close the files.txt and click Yes to save the changes.
    FindAWF wil now terminate the bad processes if running, delete the bad files and restore/replace them with the good files.
    Then it will open a log. Copy and paste the contents of that log in your next reply along with a new MGlogs.zip
     
  12. keywest928

    keywest928 Private E-2

    TimW,

    Below is the pasted log from FindAWF. Attached is the new MGlogs.zip.
    Per your instructions, we deactivated Eset during this process. It is now reactivated.

    Thanks again.



    Find AWF report by noahdfear ©2006
    Version 1.40
    Option 2 run successfully

    The current date is: Wed 02/06/2008
    The current time is: 21:58:32.71


    bak folders found
    ~~~~~~~~~~~


    Directory of C:\IBMTOOLS\UTILS\BAK

    12/16/2004 05:41 AM 90,112 ibmprc.exe
    1 File(s) 90,112 bytes

    Directory of C:\PROGRA~1\ITUNES\BAK

    10/06/2005 06:03 PM 278,528 iTunesHelper.exe
    1 File(s) 278,528 bytes

    Directory of C:\PROGRA~1\WINDOW~2\BAK

    10/18/2006 07:05 PM 204,288 WMPNSCFG.exe
    1 File(s) 204,288 bytes

    Directory of C:\PROGRA~1\ANALOG~1\SOUNDMAX\BAK

    08/06/2004 10:27 AM 860,160 smax4.exe
    07/27/2004 03:48 PM 1,388,544 SMax4PNP.exe
    2 File(s) 2,248,704 bytes

    Directory of C:\PROGRA~1\ATITEC~1\ATICON~1\BAK

    03/29/2005 11:05 PM 339,968 atiptaxx.exe
    1 File(s) 339,968 bytes

    Directory of C:\PROGRA~1\HP\HPSOFT~1\BAK

    02/19/2006 01:41 AM 49,152 HPWuSchd2.exe
    1 File(s) 49,152 bytes

    Directory of C:\PROGRA~1\ADOBE\ACROBA~2.0\READER\BAK

    03/30/2006 04:45 PM 313,472 AdobeUpdateManager.exe
    1 File(s) 313,472 bytes

    Directory of C:\PROGRA~1\COMMON~1\LENOVO\SCHEDU~1\BAK

    11/19/2007 02:23 PM 487,424 scheduler_proxy.exe
    1 File(s) 487,424 bytes


    Duplicate files of bak directory contents
    ~~~~~~~~~~~~~~~~~~~~~~~

    90112 Dec 16 2004 "C:\IBMTOOLS\utils\ibmprc.exe"
    90112 Dec 16 2004 "C:\IBMTOOLS\utils\bak\ibmprc.exe"
    14348 Jan 28 2008 "C:\Program Files\iTunes\iTunesHelper.exe"
    278528 Oct 6 2005 "C:\Program Files\iTunes\bak\iTunesHelper.exe"
    14348 Jan 28 2008 "C:\Program Files\Windows Media Player\WMPNSCFG.exe"
    204288 Oct 18 2006 "C:\Program Files\Windows Media Player\bak\WMPNSCFG.exe"
    860160 Aug 6 2004 "C:\Program Files\Analog Devices\SoundMAX\SMax4.exe"
    860160 Aug 6 2004 "C:\Program Files\Analog Devices\SoundMAX\bak\smax4.exe"
    860160 Aug 6 2004 "C:\IBMTOOLS\DRIVERS\AUDIO\SOUNDMAX\SM_PANEL\SYS\SMAX4.EXE"
    1388544 Jul 27 2004 "C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe"
    1388544 Jul 27 2004 "C:\Program Files\Analog Devices\SoundMAX\bak\SMax4PNP.exe"
    1388544 Jul 27 2004 "C:\IBMTOOLS\DRIVERS\AUDIO\SOUNDMAX\SM_PNP\SYS\SMAX4PNP.EXE"
    14348 Jan 28 2008 "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
    339968 Mar 29 2005 "C:\Program Files\ATI Technologies\ATI Control Panel\bak\atiptaxx.exe"
    14348 Jan 28 2008 "C:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
    49152 Feb 19 2006 "C:\Program Files\HP\HP Software Update\bak\HPWuSchd2.exe"
    14348 Jan 28 2008 "C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe"
    313472 Mar 30 2006 "C:\Program Files\Adobe\Acrobat 7.0\Reader\bak\AdobeUpdateManager.exe"
    14348 Jan 28 2008 "C:\Program Files\Common Files\Lenovo\Scheduler\scheduler_proxy.exe"
    487424 Nov 19 2007 "C:\Program Files\Common Files\Lenovo\Scheduler\bak\scheduler_proxy.exe"


    end of report
     

    Attached Files:

  13. keywest928

    keywest928 Private E-2

    TimW,
    This supplements the response we sent last night.
    This morning I logged onto the web and all three entries (88.80.7.66, a.doginhispen.com, and b.skitodayplease.com) reappeared in the IE7 browser history. As an fyi, the entries oftentimes appear sooner when I access the web using Quick Launch (I dragged my favorite web sites there). In addition, I noticed this entry: My Computer. When I expanded it, the following appeared: STSE.tmp and STSF.tmp Not sure what they are.
    We've tried not to ask many questions thus far because we don't want to impose on your time. But, to be honest, I'm starting to feel pretty anxious. Right now, a couple of big worries are: (1) Do these history entries mean that someone's watching what we're doing on our computer? Can they take information out of our computer files and/or track where we go and the passwords we use? Are there pre-emptive steps we should take while we work with you to remove this malware? (2) Is there a way of finding out if the Word, Excel, and music files on our pc's hard drive and on the external drive used for backup are infected? (Unfortunately, we backed up our system several days ago onto the external drive not realizing at the time that our pc was infected).
    Thanks for your time.
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Try to relax...but stay off the web until we are done, if you can.

    Please download DelDomains and unzip it to your desktop. Do not run it yet.

    Find the files from deldomains.zip on your Desktop and RightClick on the deldomains.inf file and select Install.

    (Please note if you have Spybot S&D installed you will need to "Immunize" again because deldomains will remove all of the sites Spybot adds.)

    Now Run avenger.exe by double-clicking on it.
    * Check the 'Input script manually' box.
    * Click on the magnifying glass icon.
    * Copy everything in the Quote box below, and paste it in the box that opens:
    * Now click the 'Done' button.
    * Click on the traffic light icon and OK the prompt.
    * You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt

    Download HostsXpert (http://www.majorgeeks.com/Hoster_d4626.html) and then follow the below steps.

    Unzip HostsXpert.zip
    It will create a folder named HostsXpert in whatever folder you extract it to.
    Run HostsXpert.exe by double clicking on it.
    click the Make Writeable? button.
    click Restore Microsoft's Hosts File and then click OK.
    Click the X to exit the program.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this and also attach the log from Avenger.

    Be sure to tell us how things are running.
     
  15. keywest928

    keywest928 Private E-2

    TimW,

    Followed your instructions; attached are the MGlogs.zip file and Avenger log. We also immunized Spybot. Not absolutely sure deldomains installed since we saw no icon or message saying installation was successful.

    When booting the computer to start this work, I got two error messages that I had never seen before (up till now, the boots have been without incident). Here are the messages:

    (Message 1 is typed below exactly as it appeared on my desktop. I think I located and attached the error file that it references.)

    AVG Anti Spyware 7.5 Exception
    ! Something bad happened in the application. Error diagnostics file saved to 'C:/Program Files/Grisoft/AVG Anti-Spyware 7.5\avgas.err'



    (Message 2 that I have typed below as best I recall)

    HPProduct Assistant
    The feature you are trying to use is on a cd-rom or other removable disk that is not available. Insert the 'HPProduct Assistant' disk & click ok.


    Continued thanks.
     

    Attached Files:

  16. keywest928

    keywest928 Private E-2

    TimW,

    I'm sending this second post late tonight to let you know that EsetNod32 is showing 6 items that it quarantined this evening as we were following your instructions. I'm not sure how to send them to you. They involve program files for the following:
    Adobe Acrobat
    ATI Technologies
    Lenovo Scheduler
    HP Software Update
    Windows Media Player
    iTunes helper

    The "threat" associated with each one says "Win32/KillAV.OE trojan" (minus the quotes). The action says "Cleaned by deleting - quarantined". Lastly, an information column says, "Event occurred during an attempt to access the file by the application: C:\Program Files\Grisoft\AVG Antispyware 7.5\guard.exe"

    Didn't know if this was relevant. Trying to help as best I can and very much appreciate yours.
     
  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You will need to uninstall AVG and reinstall it and the HP Product Assist (though that is really not needed!).

    Let's see if this will run:
    Start FindAWF, select Option 3, by pressing 3 and then enter.
    This will open the text file folders.txt
    Copy and paste the following list in it:
    Then close folders.txt and let it save the changes.
    FindAWF will now remove the bak folders and open a log afterwards.
    Post the log in your next reply.

    Though I think that these items are what Eset found and quarantined.

    Please download ATF Cleaner by Atribune. This program does not require an installation. The executable actually runs the program.

    NOTE: This program is for Windows XP and Windows 2000 only. ATF Cleaner will remove all files from the items that are checked so if you have some cookies you'd like to save. Please move them to a different directory first.

    * Double-click ATF-Cleaner.exe to run the program.
    * Under Main choose: Select All
    * Click the Empty Selected button.

    If you use Firefox browser

    * Click Firefox at the top and choose: Select All
    * Click the Empty Selected button.
    o NOTE: If you would like to keep your saved passwords, please click No at the prompt.

    If you use Opera browser

    * Click Opera at the top and choose: Select All
    * Click the Empty Selected button.
    o NOTE: If you would like to keep your saved passwords, please click No at the prompt.

    Click Exit on the Main ATF Cleaner menu to close the program.

    Now copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Tell me what else is going on now.
     
    Last edited: Feb 8, 2008
  18. keywest928

    keywest928 Private E-2

    Hi TimW,

    Ok...here's where we're at now:
    We followed your instructions. First we uninstalled AVG and reinstalled it. We also ran it and it caught Tribalfusion again and we deleted. As was the case several days ago, we clicked on the Report tab...but nothing was available to send to you.
    Then we uninstalled a number of the HP programs...we didn't know which one was specifically the one containing Product Assistant because it was not clearly identified. Bottom line is all but one of their programs is gone now, but the printer still works and when we are booting we're not seeing that error message...so for the moment I hoping that's resolved. (If need be, we can always uninstall the remaining HP program and then load everything through the HP installation CD.)

    The findAWF file is attached that you requested.

    We ran the ATF Cleaner (it's saved to our desktop...along with all the others). Lastly, we followed your instructions in copying the fixME.reg text to the registry.

    While we were running AVG, ESET showed a customary update popup message and a few moments later all heck broke loose. One ESET quarantine message after another appeared and this went on throughout the AVG scan as well as when we were following your FindAWF instructions. 21 ESET quarantines appeared this evening. Thinking you may want to see them, we copied the log in Notepad and attached it to this post.

    Please tell us what we are supposed to do about these ESET quarantined files. I haven't deleted any of them yet.

    Thanks again. We look forward to hearing from you.
     

    Attached Files:

  19. keywest928

    keywest928 Private E-2

    TimW
    This is in addition to the post we sent last night.
    We were on the web today testing things out; surfed for about an hour. The messages a.doginhispen.com, b.skitodayplease.com and 80.88.7.66 did not appear in the IE7 browser history and there were no intermittent shut downs.
    On the downside, power management does not seem to be working (standby, hibernate, monitor) and the Scheduler in Lenovo's ThinkVantage update program was not accessible. So we uninstalled the program and reinstalled it from the web. Scheduler seems to be working now but not sure what it means regarding which programs have been affected that we haven't discovered yet.
    Thanks as usual for your help. Keep us posted.
     
  20. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Your anti-virus was just reporting the items in you system restore (which will be removed when you toggle it in the final instructions), and the quarantine folders.

    You will have to go to the web site of your computer manufacturer and download new drivers for the power management system ....I take it nothing happens when you go to the control panel and click on power management?

    What are you seeing in device manager?

    If you are not having any other malware problems, it is time to do our final steps:

    1. If we used Pocket Killbox during your cleanup, do the below
    * Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix, you can delete the ComboFix.exe file, C:\ComboFix folder, C:\QooBox folder, C:\WINDOWS\nircmd.exe, C:\combofix.txt and C:\ComboFix-quarantined-files.txt logs that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used SmitFraudFix, you can delete all files and folders related to it now including the c:\rapport.txt log.
    5. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    6. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    7. If we had you run Avenger, you can delete all files related to Avenger now.
    8. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    9. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    10. If you are running Windows XP or Windows ME, do the below:
    * Refer to the cleaning steps in the READ ME for your Window version and see the steps to Disable System Restore which will flush your Restore Points.
    * Then reboot and Enable System Restore to create a new clean Restore Point.
    11. After doing the above, you should work thru the below link:
    *How to Protect yourself from malware!
     
  21. keywest928

    keywest928 Private E-2

    TimW,

    Thanks once again for your continued support.

    We followed your most recent instructions, including purging and resetting the system restore point.

    We're still a bit confused about a few remaining issues. Would you mind offering your guidance?

    1) In your previous posts, you told us to install Spybot, AVG Antispyware, Super Antispyware, and FindAWF. We have not deleted these as of yet. Am I correct in assuming it's a good idea for us to keep one or two of the the antispyware programs installed (maybe Spybot and AVG) and to delete FindAWF?

    2) Since this is the first time we've ever experienced a computer infection, we're not sure what to do with the quarantined files that ESET Nod32 has listed. (I attached those as a text file in my previous post to you.) Is it okay now for us to delete them from the quarantine list?

    3) Regarding the power management issue, yes...I can access Power Options from the Control Panel. The problem is that even though the settings may indicate that the monitor should turn off after X minutes and the system go into standby or hibernate Y minutes after that, nothing happens. In addition, we've noticed that the Autoplay feature no longer works. What I mean is that we used to be able to insert a cd or plug an external drive into a USB port and a pop-up Autoplay box would appear asking us what action to take. That pop-up box no longer shows up. A work-around is for us to use Start > My Computer. But, do you think these problems are a consequence of the malware and that other functions may have been affected as well?

    We know we've said it before, but we are grateful for you assistance.
     
  22. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You can keep all anti-spyware programs if you wish ..and uninstall FindAWF.

    You can delete the quarantined files ...

    As to the last question...yes, the malware messed with those items. Go to start / run / type "sfc /scannow" without quotes and have your xp cd handy.

    If you still have problems ...please post in the software section where you can be assisted in restoring some of those functions.

    And you are most welcome.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds