Solved

infection and weirdness w32.ramdec

Posted on 2004-04-10
10
162 Views
Last Modified: 2010-04-13
It appears, according to Norton Anti-Virus, my laptop is infected by the W32.ramdec virus.  Every time I try to open Regedit, or any program for that matter, Windows tries to find a program to open it i.e. it is treating executables as files and doesn't know what to do with them. The only program that works is Explorer.exe (through My Computer)
Help I don't know how to rid myself of this worm
Thanks in advance,
lostandscared


p.s. also, I can't access any control panel features. "Access to specified device, path, or file is denied."
0
Comment
Question by:lostandscared
  • 6
10 Comments
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 10798673
Boot to safe mode (F8 at startup) and try running Norton from there to kill the virus..

If that does not work, then boot to Safe Mode with Networking, and try an online scan...

Virus Check On Line

Online virus scan:  http://www3.ca.com/virusinfo/

Security Check:  http://www.symantec.com/product/index_homecomp.html

Online trojan scan? www.trojanscan.com
0
 

Author Comment

by:lostandscared
ID: 10799168
i virus is already gone. norton caught it. its the damage I'm trying to repair.
for some reason all executables were spawning Microsoft Word. Everytime I start a program Word opens and tries to edit the executable.
So, not knowing what to do, I opened (under Explorer) Tools, Folder Options, File Types. I reassociated exe with ms-dos programs. This fixed the word problem but I lost all the icon associations for each executable.
 
0
 
LVL 40

Accepted Solution

by:
Fatal_Exception earned 125 total points
ID: 10799192
Viruses can and do exploit file exploits and their associations. Thus, it is important that file extension viewing is enabled and that you are aware of which extensions are associated with which programs. Before proceeding further, ensure file extension viewing is enabled on your system. Visit the Executable File Extension center for details.

http://antivirus.about.com/library/lessons/blfileassoc.htm\

Executable File Extensions

http://antivirus.about.com/library/blext.htm
0
Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 10799212
EXE files should be associated with Applications... ck the list in the link above for associations...

FE
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 11574441
This question needs to be closed out, unless you have a reason to leave it open.  If you would, please accept one of the experts comments, or split the points if more than one expert helped you.  If you do not know how to do this, please go here for help:

How do I close a question?
http://www.experts-exchange.com/Community_Support/help.jsp#hi9

Closing Questions
http://www.experts-exchange.com/Community_Support/help.jsp#hs5

Thanks,

FE
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 12303810
hmmmm
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 12406345
Thanks
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
auto copy 8 616
vCenter Converter Standalone 4.01 - Convert Old Server 2000 to VM 4 171
Referencing a mapped drive 6 136
Screen Mirroring 7 69
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
There’s a good reason for why it’s called a homepage – it closely resembles that of a physical house and the only real difference is that it’s online. Your website’s homepage is where people come to visit you. It’s the family room of your website wh…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question