Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

A virus or something else?


  • Please log in to reply
11 replies to this topic

#1 hester pryne

hester pryne

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 22 April 2009 - 11:21 AM

Let me start by saying I am a novice but I can follow directions. :thumbsup:

I am using a 3 y/o Gateway laptop; Windows XP; Kaspersky Internet Security 7.0.; ad-aware SE personal (run occasionally)

Two weeks ago, I was directed by an "online" tech at Kaspy to run "combofix". Althought the Kaspy said it was running and my computer protected, Windows security said Kaspy was disabled. I was getting pop-up messages saying my computer was infected and I needed to run some program (which I ignored but had the devil of a time closing the pop-up). Additonally, computer was "not responding" more often then it was. I disabled Kaspy, ran the Combofix according to the directions I was given, enabled Kaspy and ran a complete scan. Two red alerts popped up and I did as directed. I saved the Combofix scan, btw, though the tech at Kaspy said he wasn't able to deal with it.

Anyway, things seemed better but...I now have the following problems:
1. The mouse appears to automatically "double click". Ex: if I want to go back 1 page, it will go back 2.
2. It takes several clicks for the favorites menu to stabilize. (appears and then disappears mutiple times before it "takes")
3. When a favorite site is chosen, it often doesn't open...and I'm redirected. Ex: home page is FOX; click on ebay, will be directed to specific Fox news story instead.
4. Pictures and documents are slow to open and often freeze ("not responding" message)

After reviewing many of the posts and questions here, and statements that Combofix is a "dangerous tool", I'm concerned that using it may have caused a problem itself....though it did seem there was something preventing Kaspersky from functioning properly at the time.

Any suggestion as to how to deal with my current problems would be greatly appreciated. Thanks.

BC AdBot (Login to Remove)

 


#2 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:12:55 PM

Posted 22 April 2009 - 05:03 PM

I saved the Combofix scan, btw, though the tech at Kaspy said he wasn't able to deal with it.

Interesting statement. I will pass this information on to the programs creator.

Let's take a look with Malwarebytes - and start there.


The process of cleaning your computer may require temporarily disabliling some security programs. If you are using SpyBot Search and Destroy, please refer to Note 2 at the bottom of this page.

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note:
-- If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Note 2:
-- MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes (like Spybot's Teatimer), they may interfere with the fix or alert you after scanning with MBAM. Please disable such programs until disinfection is complete or permit them to allow the changes. To disable these programs, please view this topic: How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#3 hester pryne

hester pryne
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 22 April 2009 - 05:13 PM

Thank you. I will give this a try. I am going to assume that I will need to temporarily exit Kaspersky since it seems to be sensitive to these things.

As for the tech at Kaspy.... I believe he was not able to "support" it or review because it is not a Kaspy program. Perhaps he should not have recommended it in that case.

I wil let you know if my problem(s) resolve. :thumbsup:

Hester

#4 hester pryne

hester pryne
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 22 April 2009 - 07:32 PM

Here is the log, as requested...

Malwarebytes' Anti-Malware 1.36
Database version: 2029
Windows 5.1.2600 Service Pack 3

4/22/2009 8:23:28 PM
mbam-log-2009-04-22 (20-23-28).txt

Scan type: Quick Scan
Objects scanned: 86348
Time elapsed: 10 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

It appears that nothing was detected. Strangely enough, when I went to "select all" to copy this report for inclusion in the reply, it took three tries before that actually happened. That is the kind of thing that has been occuring lately. Anyway, thanks for your advice. I'm not sure where to go from here. A friend suggested that I perhaps consider deleting my temporary files.

Hester

#5 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:12:55 PM

Posted 22 April 2009 - 07:51 PM

Let's look at a few logs before we move to a different path.

Install RootRepeal

Click here - Official Rootrepeal Site, and download RootRepeal.zip. I recommend downloading to your desktop.
Fatdcuk at Malwarebytes posted a comprehensive tutorial - Self Help guide can be found here if needed.: Malwarebytes Removal and Self Help Guides.
Click RootRepeal.exe to open the scanner.
Click the Report tab, now click on Scan. A Window will open asking what to include in the scan.
Check the following items:
Drivers
Files
Processes
SSDT
Stealth Objects
Hidden Services

Click OK
Scan your C Drive (Or your current system drive) and click OK. The scan will begin. This my take a moment, so please be patient. When the scan completes, click Save Report.
Name the log RootRepeal.txt and save it to your Documents folder - (Default folder).
Paste the log into your next reply.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#6 hester pryne

hester pryne
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 22 April 2009 - 08:42 PM

The log from RootRepeal, as requested....


ROOTREPEAL © AD, 2007-2008
==================================================
Scan Time: 2009/04/22 21:34
Program Version: Version 1.2.3.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF091F000 Size: 98304 File Visible: No
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7A9E000 Size: 8192 File Visible: No
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xED516000 Size: 45056 File Visible: No
Status: -

SSDT
-------------------
#: 025 Function Name: NtClose
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a17370

#: 031 Function Name: NtConnectPort
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a15420

#: 041 Function Name: NtCreateKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a087a0

#: 047 Function Name: NtCreateProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a170a0

#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a17210

#: 050 Function Name: NtCreateSection
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a17e70

#: 052 Function Name: NtCreateSymbolicLinkObject
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a17940

#: 053 Function Name: NtCreateThread
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a187b0

#: 063 Function Name: NtDeleteKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a088a0

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08920

#: 068 Function Name: NtDuplicateObject
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a17510

#: 071 Function Name: NtEnumerateKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a089b0

#: 073 Function Name: NtEnumerateValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08a60

#: 079 Function Name: NtFlushKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08b10

#: 092 Function Name: NtInitializeRegistry
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08b90

#: 097 Function Name: NtLoadDriver
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a14fd0

#: 098 Function Name: NtLoadKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a09590

#: 099 Function Name: NtLoadKey2
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08bb0

#: 111 Function Name: NtNotifyChangeKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08c80

#: 116 Function Name: NtOpenFile
Status: Hooked by "kl1.sys" at address 0xf7132030

#: 119 Function Name: NtOpenKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08d60

#: 122 Function Name: NtOpenProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a16e90

#: 125 Function Name: NtOpenSection
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a17ca0

#: 160 Function Name: NtQueryKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08e30

#: 161 Function Name: NtQueryMultipleValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08ee0

#: 173 Function Name: NtQuerySystemInformation
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a18460

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a08f90

#: 193 Function Name: NtReplaceKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a09040

#: 200 Function Name: NtRequestWaitReplyPort
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a15a00

#: 204 Function Name: NtRestoreKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a090d0

#: 206 Function Name: NtResumeThread
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a18760

#: 207 Function Name: NtSaveKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a092d0

#: 213 Function Name: NtSetContextThread
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a18ae0

#: 224 Function Name: NtSetInformationFile
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a190a0

#: 226 Function Name: NtSetInformationKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a09360

#: 237 Function Name: NtSetSecurityObject
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a13c20

#: 240 Function Name: NtSetSystemInformation
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a17b20

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a09400

#: 254 Function Name: NtSuspendThread
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a18710

#: 255 Function Name: NtSystemDebugControl
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a152e0

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a18300

#: 263 Function Name: NtUnloadKey
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a09550

#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "C:\WINDOWS\system32\drivers\klif.sys" at address 0xf0a173d0

Stealth Objects
-------------------
Object: Hidden Thread [ETHREAD: 0x85c7f770, TID: 708]
Process: avp.exe (PID: 704) Address: 0x004206c8 Size: -

Object: Hidden Thread [ETHREAD: 0x85c3da28, TID: 728]
Process: avp.exe (PID: 704) Address: 0x77df3539 Size: -

Object: Hidden Thread [ETHREAD: 0x85bec4e0, TID: 848]
Process: avp.exe (PID: 704) Address: 0x30484180 Size: -

Object: Hidden Thread [ETHREAD: 0x85d8b7a8, TID: 1064]
Process: avp.exe (PID: 704) Address: 0x316733b9 Size: -

Object: Hidden Thread [ETHREAD: 0x85a74968, TID: 1128]
Process: avp.exe (PID: 704) Address: 0x31451129 Size: -

Object: Hidden Thread [ETHREAD: 0x85ae9490, TID: 280]
Process: avp.exe (PID: 704) Address: 0x31441a47 Size: -

Object: Hidden Thread [ETHREAD: 0x85ef5968, TID: 2180]
Process: avp.exe (PID: 704) Address: 0x30bb20de Size: -

Object: Hidden Thread [ETHREAD: 0x85320780, TID: 2300]
Process: avp.exe (PID: 704) Address: 0x77e76c7d Size: -

Object: Hidden Thread [ETHREAD: 0x853cc968, TID: 2304]
Process: avp.exe (PID: 704) Address: 0x00000000 Size: -

Object: Hidden Thread [ETHREAD: 0x85384540, TID: 2436]
Process: avp.exe (PID: 704) Address: 0x00000000 Size: -

Object: Hidden Thread [ETHREAD: 0x85510480, TID: 2452]
Process: avp.exe (PID: 704) Address: 0x00000000 Size: -

Object: Hidden Thread [ETHREAD: 0x853fcda8, TID: 3324]
Process: avp.exe (PID: 704) Address: 0x7c927edb Size: -

Object: Hidden Thread [ETHREAD: 0x85d8fa18, TID: 3332]
Process: avp.exe (PID: 704) Address: 0x7c929b8f Size: -

Object: Hidden Thread [ETHREAD: 0x853bf8a0, TID: 376]
Process: avp.exe (PID: 704) Address: 0x769c8761 Size: -

Object: Hidden Thread [ETHREAD: 0x85ad0da8, TID: 2948]
Process: avp.exe (PID: 2944) Address: 0x004206c8 Size: -

Object: Hidden Thread [ETHREAD: 0x85c19da8, TID: 3172]
Process: avp.exe (PID: 2944) Address: 0x30484180 Size: -

Object: Hidden Thread [ETHREAD: 0x85487da8, TID: 3604]
Process: avp.exe (PID: 2944) Address: 0x00000000 Size: -

Object: Hidden Thread [ETHREAD: 0x85492968, TID: 3620]
Process: avp.exe (PID: 2944) Address: 0x31441a47 Size: -

Object: Hidden Thread [ETHREAD: 0x85bb9da8, TID: 3772]
Process: avp.exe (PID: 2944) Address: 0x31441a47 Size: -

Object: Hidden Thread [ETHREAD: 0x85e36b30, TID: 2412]
Process: avp.exe (PID: 2944) Address: 0x00000000 Size: -

Object: Hidden Thread [ETHREAD: 0x85485020, TID: 2428]
Process: avp.exe (PID: 2944) Address: 0x00000000 Size: -

Object: Hidden Thread [ETHREAD: 0x853a6998, TID: 2432]
Process: avp.exe (PID: 2944) Address: 0x00000000 Size: -

Object: Hidden Thread [ETHREAD: 0x85ea2638, TID: 2592]
Process: avp.exe (PID: 2944) Address: 0x31441a47 Size: -

Object: Hidden Thread [ETHREAD: 0x85373da8, TID: 2672]
Process: avp.exe (PID: 2944) Address: 0x31441a47 Size: -

Object: Hidden Thread [ETHREAD: 0x862d1258, TID: 1812]
Process: avp.exe (PID: 2944) Address: 0x31441a47 Size: -

Object: Hidden Thread [ETHREAD: 0x85b1e970, TID: 1472]
Process: avp.exe (PID: 2944) Address: 0x72d230e8 Size: -

Object: Hidden Thread [ETHREAD: 0x84fb65f0, TID: 2516]
Process: avp.exe (PID: 2944) Address: 0x76b44dca Size: -

Object: Hidden Code [ETHREAD: 0x85cfacc8]
Process: System Address: 0x857937a0 Size: -

Object: Hidden Code [ETHREAD: 0x85b9e678]
Process: System Address: 0x857937a0 Size: -

Object: Hidden Code [ETHREAD: 0x85d12c00]
Process: System Address: 0x8577ca30 Size: -

Object: Hidden Code [ETHREAD: 0x85cea838]
Process: System Address: 0x8577ca30 Size: -

Object: Hidden Code [ETHREAD: 0x85ca7da8]
Process: System Address: 0x8577ca30 Size: -

#7 hester pryne

hester pryne
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 23 April 2009 - 05:05 AM

As an aside, despite that fact that the Kaspersy tech could not "support" the CF application he directed me to run, and didn't ask for the log, I did save it.......if anyone is interested.

Of course, I won't post it here unless asked to do so.

btw, I did spend a good bit of time deleting "junk" documents/images that have been hanging around since the beginning of time and I will, sometime today, delete temporary files.

Things have sped up somewhat but, frankly, the machine still acts a little hinky with basic functions such as previously described. Kaspersky has been running like a happy little camper; scanning and detecting nothing.

Thank you for your time and expertise.

Hester

#8 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:12:55 PM

Posted 23 April 2009 - 06:37 AM

It looks clean to me.

I would suggest starting a topic in the XP forum restating what you said here. There may have been files that were damaged during cleaning. They may advise you to do a repair install, but I would rather wait to see if there is something I am missing.

Good luck!

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#9 hester pryne

hester pryne
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 23 April 2009 - 07:12 AM

Happy to hear that....whew! As for posting over in the XP forum, I'll do that. Great suggestion.

Again, thank you all for your time and your expertise in maintaining this helpful forum.

Gotta love a Geek! :thumbsup: You guys rock!

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,395 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:55 PM

Posted 23 April 2009 - 08:30 AM

In reply to your PM.

However, now I am having other issues which I outlined in a post under "Am I infected" today. After further investigation, Kaspersky detected a "virusHeur.Invader" on the Combofix file on my Desktop. To be sure I wasn't seeing things (or misinterpreted something), I ran a scan just on the single file and got the same squawky message from Kaspy. I am not sure now exactly how to get rid of it! Will simply deleting the file take care of it?

Combofix is not malware. However, certain embedded files that are part of legitimate programs or specialized fix tools such as Combofix may at times be detected by some anti-virus and anti-malware scanners as a "Risk Tool", "Hacking Tool", "Potentially Unwanted Program", or even "Malware" (virus/trojan) when that is not the case. This occurs for a variety of reasons to include the tool's compiler, the files it uses, registry fixes and malware strings it contains.

Such programs have legitimate uses in contexts where a Malware Removal Expert asked you to use the tool or when an authorized user/administrator has knowingly installed it. When flagged by an anti-virus or security scanner, it's because the program includes features, behavior or files that appear suspicious or it can potentially be used for malicious purposes. These detections do not necessarily mean the file is malware or a bad program. It means it has the potential for being misused by others or that it was simply detected as suspicious due to the security program's Heuristic analysis engine which provides the ability to detect possible new variants of malware. Anti-virus scanners cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert you or even automatically remove them. In these cases the detection is a "False Positive".

Please download OTCleanIt.exe and save to your Desktop.
  • Connect to the Internet and double-click on the file to launch the program.
  • Click on the green CleanUp! button.
  • If you get a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the Internet, please allow the connection.
  • When it has finished, OTCleanIt will ask you to reboot so it can remove itself.
-- Note: Doing this will remove any specialized tools (including this one) downloaded and used.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 hester pryne

hester pryne
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 23 April 2009 - 09:34 AM

Ok....did that. Took seconds and it is gone , too.

Course I'm still having the functions problems as outlined earlier but I did post over in the XP forum so maybe some ideas will surface. For some reasons, I am suspecting the mouse as I discovered that the key board functions I know are working.

Thanks alot everyone.

Hester

#12 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,395 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:55 PM

Posted 23 April 2009 - 10:01 AM

You're welcome on behalf of the Bleeping Computer community.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users