lexplore appears and avoid the links to run

Posted on 2006-11-26
Last Modified: 2013-12-04
Dear Sir:
Sometimes I click an Internet link to go where it sends, but the link does not
reply. Then I verify with "ctrl+alt+del" what it happens and if I find in the list that appears "lexplore" I delete it and so the link works well.
I want you, if possible,to tell me what must I do to avoid that "lexplore to appear"
I ask you too, what kind of crudware is "lexplore" file?
Waiting your reply, I thaks in advance
Sunday, November 26 2006 20 02 hs. (GMT -3 00)
Question by:SYMOTOM
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
LVL 97

Expert Comment

ID: 18016323
Greetings, SYMOTOM !

Do you mean iexplore.exe?  Iexplore.exe is the executable file for Internet Explorer.

You may need to register some dll files;en-us;Q281679&sd=tech
Run this script

Best wishes!

Author Comment

ID: 18022236
Dear war1
I say lexplore (LEXPLORE), I don´t  know what is it . I only know that my
lexplore is not the Iexplore.exe because as you say it is the executable file for Internet Explorer and mine does not allow the correct development of Internet
Explorer 6 and it appears two or three times in the list of the active programs (ctrl+alt+del).
Waiting your reply I thank you in advance.
Monday, 27 November 2006

LVL 97

Accepted Solution

war1 earned 500 total points
ID: 18022380

Lexplore is a virus

Check for virus and adware

Housecall Online Scan
Panda Activescan
Kaspersky Virus Scan

Spy Sweeper
SpyBot S&D searches your harddisk for so-called spy- or adbots;

3. If still no joy, download HijackThis

Run the program and you will find many entries. Most are OK. Post the log at and click Analyse, Save.  Post a link to the saved list here.
LVL 97

Expert Comment

ID: 18046556

Any update?

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question