1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Windows Explorer / Windows ME

Discussion in 'Earlier Versions of Windows' started by tricky69, Jan 23, 2005.

Thread Status:
Not open for further replies.
Advertisement
  1. tricky69

    tricky69 Thread Starter

    Joined:
    Jan 23, 2005
    Messages:
    3
    I have a Sony Vaio bought in 2001 (PCG-FX215) running Windows ME.

    I recently downloaded a bunch of Microsoft updates (which may or may not be causing this problem).

    Windows Explorer keeps repeatedly failing, which halts other operations (e.g. opening Internet Explorer 6.0 sp1)

    I can kill Windows Explorer by CTRL-ALT-DEL, End Task, which then allows me to open other operations, but then Windows Explorer trys to re-start, and then re-fails, again and again.

    I have run AdAware, SpySubtract, Norton Anti-Virus, CWShredder, and HijackThis (removing offending items I recognized from other threads).

    All to no avail ... any ideas?
     
  2. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Hi tricky69, Welcome to TSG!!

    You should post your HJT log here so we can see if anything looks suspect.
     
  3. tricky69

    tricky69 Thread Starter

    Joined:
    Jan 23, 2005
    Messages:
    3
    Here it is. By the way I downloaded SpyBot Search & Destroy since previous post and found 24 nasties including CoolWWWSearch ... not sure why CW Shredder didn't get them earlier. They're gone now, but still the same problems.

    Logfile of HijackThis v1.99.0
    Scan saved at 5:36:57 PM, on 1/23/2005
    Platform: Windows ME (Win 9x 4.90.3000)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\SYSTEM\KERNEL32.DLL
    C:\WINDOWS\SYSTEM\MSGSRV32.EXE
    C:\WINDOWS\SYSTEM\mmtask.tsk
    C:\WINDOWS\SYSTEM\MPREXE.EXE
    C:\PROGRAM FILES\NORTON ANTIVIRUS\RTVSCN95.EXE
    C:\PROGRAM FILES\NORTON ANTIVIRUS\DEFWATCH.EXE
    C:\WINDOWS\SYSTEM\SYSTRAY.EXE
    C:\WINDOWS\SYSTEM\WMIEXE.EXE
    D:\PROGRAM FILES\HP\DIGITAL IMAGING\BIN\HPQTRA08.EXE
    C:\PROGRAM FILES\INTERMUTE\SPYSUBTRACT\SPYSUB.EXE
    C:\PROGRAM FILES\LINKSYS\WIRELESS-G NOTEBOOK ADAPTOR\ODHOST.EXE
    C:\PROGRAM FILES\LINKSYS\WIRELESS-G NOTEBOOK ADAPTOR\WPC54CFG.EXE
    D:\PROGRAM FILES\HP\DIGITAL IMAGING\BIN\HPQGALRY.EXE
    C:\WINDOWS\SYSTEM\PSTORES.EXE
    C:\WINDOWS\SYSTEM\SPOOL32.EXE
    C:\WINDOWS\SYSTEM\STIMON.EXE
    C:\WINDOWS\SYSTEM\DDHELP.EXE
    C:\WINDOWS\SYSTEM\RESTORE\STMGR.EXE
    C:\WINDOWS\EXPLORER.EXE
    C:\WINDOWS\TEMP\TD_0003.DIR\HIJACKTHIS.EXE

    R0 – HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.smh.com.au/
    O2 – BHO: AcroIEH1prObj Class – {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} – C:\PROGRAM FILES\ADOBE\ACROBAT 6.0\READER\ACTIVEX\ACROIEHELPER.DLL
    O2 – BHO: (no name) – {53707962-6F74-2D53-2644-206D7942484F} – C:\Program Files\SpyBot – Search & Destroy\SDHelper.dll
    O3 – Toolbar: &Radio – {8E718888-423F-11D2-876E-00A0C9082467} – C:\WINDOWS\SYSTEM\MSDXM.OCX
    O4 – HKLM\..\Run: [SystemTray] SysTray.Exe
    O4 – HKLM\..\RunServices: [rtvscn95] C:\Program Files\Norton AntiVirus\rtvscn95.exe
    O4 – HKLM\..\RunServices: [defwatch] C:\Program Files\Norton AntiVirus\defwatch.exe
    O4 – HKLM\..\RunServices: [*StateMgr] C:\WINDOWS\System\Restore\StateMgr.exe
    O4 – Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O4 – Startup: Wireless-G Notebook Adaptor Utility.lnk = C:\ Program Files\Linksys\Wireless-G Notebook Adaptor\Startup.exe
    O4 – Startup: HP Digital Imaging Monitor.lnk = D:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    O4 – Startup: HP Image Zone Fast Start.lnk = D:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
    O4 – Startup: SpySubtract.lnk = C:\Program Files\Intermute\SpySubtract\SpySub.exe
    O9 – Extra button: Related – {c95fe080-8f5d-11d2-a20b-00aa003c157a} – C:\WINDOWS\web\related.htm
    O9 – Extra ‘Tools’ menuitem: Show &Related Links – {c95fe080-8f5d-11d2-a20b-00aa003c157a} – C:\WINDOWS\web\related.htm
    O15 – Trusted IP range: 206.161.125.149
    O15 – Trusted IP range: 206.161.125.149 (HKLM)
    O16 – DPF: {6F750200-1362-4815-A476-88533DE61D0C} (Ofoto Upload Manager Class) – http://www.ofoto.com/downloads/BUM/BUM_WIN_IE_1/axofup1d.cab
     
  4. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
  5. tricky69

    tricky69 Thread Starter

    Joined:
    Jan 23, 2005
    Messages:
    3
    Thanks CyberTech, but two questions ...

    (1) this is a .inf file ... is that right? I downloaded it but its just a text file.

    (2) when you say "the entry is still there" what entry do you mean.

    P.S. been away for a few days thus the delay in responding.
     
  6. elaich

    elaich

    Joined:
    Jan 22, 2005
    Messages:
    40
    Do you have a firewall? If so, is Windows Explorer trying to access the Internet? This is a sure sign that you have malware on your computer.

    It sure sounds like some other process is trying to use WE for something.
     
  7. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    The file looks like a text file, right click on it and choose install.

    Post another log after you install it and reboot.
     
  8. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/322656

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice