Jump to content

mewnlite

Members
  • Content Count

    2
  • Joined

  • Last visited

About mewnlite

  • Rank
    Newbie
  1. Thank you so much. There was too much stuff in [HKEY_CLASSES_ROOT\.exe] It was like [HKEY_CLASSES_ROOT\.exe\shell\open\command] which had a value pointing to a user's tmp file. Deleting that whole shell section took care of it. I did find "%1" %* in a couple of places and changed it to "\"%1\" %*" as your example showed. However that yielded access denied errors when I tried to open *anything*. Fortunately I had the foresight to save that key before I made the change and got it back. It didn't like the backslashes. Thanks again!
  2. This Windows XP SP3 machine had a rogue security app which cleaned up nicely with MBAM and SAS. EXE files would not run but that problem was fixed by a batch and reg file that I obtained the link to a couple of weeks ago in alt.privacy.spyware. Everything is now working fine but SuperAntispyware keeps detecting this one item. I searched the registry for HKCR\.exe and don't come up with anything. Google isn't showing anything since mid 2010 about this detection. Can anyone help? Thanks
×
×
  • Create New...