How to Fix Requested Resource is in Use Error

The error message “The requested resource is in use” on a Windows computer could be an indication of Tprdpw32 rootkit malware. Below are the steps to fix this worrying error on your computer.

Requested resource is in use Error

Even though the “Requested resource is in use” pop-up window may look harmless or intriguing, you need to be concerned and eliminate the possibility that your computer is infected with malware.

This error message has been associated with SmartService Trojan Horse malware, also known as Tprdpw32 rootkit virus.

SmartService Malware blocks the antivirus software installed on a Windows computer and displays the message “The requested resource is in use” when you try to run the antivirus program.

This malware also prevents you from closing spyware and adware programs installed on your computer by showing “The operation could not be completed. Access Denied” message.

Fix the “Requested resource is in use” error.

If you get the error Requested resource in use when trying to open a file or folder, disabling the preview pane (Method #1 below) should help resolve the issue.

If you get the error “Requested resource is in use” when trying to remove a printer port, you can refer to this guide: TCP/IP printer port cannot be deleted in Windows 10.

However, if the error is due to SmartService virus, then you need to use other methods as given below to remove SmartService virus from your computer.

1. Disable the preview window

If you get the error Using the requested resource when trying to copy a file or folder, you probably have the preview pane enabled in File Explorer.

1. Open file manager on your computer.

Open File Explorer

2. On the File Explorer screen, click the outlook Tab and Disable preview area.

Disable Preview Pane

Also check if the file or folder you are trying to open is in use by another program on your computer and close the program that was using the file/folder.

If you’re still getting the “Requested resource is in use” error, your computer might be affected by malware.

2. Run Windows Defender offline scan

Using Windows Defender offline can help you detect stubborn and hard-to-detect malware.

1. Open settings > click Updates & Security.

Update and security settings option in Windows

2. On the next screen, click Windows security in the left pane. In the right pane, click Virus and threat protection Possibility.

Virus and threat protection option on Windows Security screen

3. On the next screen, click the Extended scan Possibility.

Run Windows Defender Advanced Scan

4. Select on the next screen Windows Defender offline scan and click scan now.

Scan computers with Windows Defender

5. Wait for Windows Defender to scan and remove malware (if any) from your computer.

To check if malware has been removed, go to scan history > See Full History Side.

4. Check startup programs

Most malware programs tend to start with the computer and become active as soon as you start the computer.

1. Right click on the beginning click and click task manager.

Open Windows Task Manager

2. On the Task Manager screen, click the tarnishing tab and Deactivate Programs from unknown publishers.

Disable unknown Windows programs

If you’re not sure, search the Internet for more information about the program you’re trying to disable.

5. Uninstall malicious programs

Take a close look at all programs installed on your computer and uninstall any programs that look suspicious.

1. Right click on the beginning click and click To run.

Open the Windows RUN command

2. In the Run Command window, type appwiz.cpl and click OK.

Run the appwiz.cpl command

3. On the Programs and Features screen, identify and uninstall suspicious-looking programs.

Uninstall suspicious programs in Windows

Note: Make sure you don’t uninstall any Microsoft programs or programs related to browser and antivirus software.

If you’re not sure, you can get more information about the program you’re trying to uninstall by doing a Google search.

6. Check the hosts file

Malware programs can inject IP addresses into the hosts file to redirect browser requests and for other malicious purposes.

The default hosts file in Windows 10 is located at C:\Windows\system32\drivers\etc and it just contains a few comment lines starting with the ‘#’ character.

IP addresses in the Windows hosts file

If your computer is affected by malware, you will see unknown IP addresses, domains or hostnames listed in the hosts file.

In such a case, you need to remove unknown IP addresses by editing the hosts file.

7. Use the scan in safe mode

SmartService malware can stop antivirus programs. Therefore, it can only be scanned and removed by starting your computer in Safe Mode.

If you start the computer in safe mode, you can run the virus removal software without being affected by SmartService malware.

1. Open settings on your computer and click Updates & Security.

2. On the next screen, click Restoration in the left pane. In the right pane, scroll down and click Restart now Button located under the Advanced Home section.

Start Windows in recovery mode

3. Switch to on the next screen Troubleshooting > Expanded options > Startup Settings and click the Start anew Button.

Windows 10 start settings screen

4. Select after the computer restarts Activate Safe Mode Option (F4 key) to start your computer in safe mode.

5. In safe mode, run antivirus software available on your computer to remove malware.

8. Remove malicious registry entries

Warning: Modifications to registry files can seriously affect the functioning of your computer. Therefore, this step is for advanced users only.

1. Open To run command > type regedit and click OK.

Open the Windows registry with the

2. On the Registry Editor screen, press Ctrl+F to bring up the search box and search SmartService Malware in registry files.

Search the registry for SmartService

3. Similarly, scan for other malware (if you know their names) and remove them.

4. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion

In the Current Version folder, open any folders that contain the word “To run‘ and look for suspicious entries in these folders.

Before disabling or removing any suspicious entries, make sure you look them up and get more information about them.


Leave a Reply

Your email address will not be published.