Solved

Possible W32.leave.worm?

Posted on 2004-04-22
5
308 Views
Last Modified: 2012-05-04
My PC running winXP came up with a "setup50.exe Bad Image" error when booting up. I have Symantec Corporate Edition Av with live updates from our network. I could not open any programs.
I ran a virus scan with no viruses found. I then ran Spybot, Adaware and CWShredder and I could now open Word, Access and Excel, but no AS400 or Outlook. Outlook came up with the "Outlook has experienced a problem and will close" error, while the As400 just flashed a small window and disappeared. Tryong to access any free online scanners (Housecall, Symantec, Panda etc..) didn't work. The dropdown lists also won't work on any web page I am on.
My research came up with  the W32.leave worm , but after walking through the steps from the MS Knowledge base it does not contain the "reg sv" that it says to delete in the registry.
I am at my wits end, anyone out there who can help?
0
Comment
Question by:iamh4
  • 2
5 Comments
 
LVL 2

Expert Comment

by:LeftofCool
Comment Utility
Try redoing everything in safe mode with networking.
0
 

Author Comment

by:iamh4
Comment Utility
Hey LoC,
I hadn't done that but just I jusst finished and everything is still the same. no AS400, no Outlook and the AV websites won't access for me. Like I said earlier I don't think it is the Leave worm but I am still in a quandry. Anyone else?
0
 

Author Comment

by:iamh4
Comment Utility
Thank all, but I reinstalled IE and outlook and ran systemworks and all seems fine .
0
 

Accepted Solution

by:
modulo earned 0 total points
Comment Utility
PAQed, with points refunded (125)

modulo
Community Support Moderator
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now