scanning and repairing a worm virus

Posted on 2006-04-03
Last Modified: 2010-04-12
I have received complaints that I have been sending emails with no sense to people.  I received a notice from a postmaster that they detected the following virus in my email message:

Worm.SomeFool.Gen-2 and W32/Netsky-B

I have an updated Norton software but have not detected these virus.

How can I detect the virus from my computer and remove these?

Question by:meadoza
    LVL 27

    Expert Comment

    Have you ran your anti-virus in Safe Mode?
    Please clear all Temp Files (including Internet Explorer) and do so if you have not.
    As backup assurance I would run another anti-virus suite such as Kaspersky (In Safe Mode as well) to see what it locates.
    LVL 47

    Expert Comment

    If you have Netsky this would detect and remove it.

    Run it to find out if you have it or not, sometimes resident antivirus doesn't work well in detecting a virus once the virus is already in the system.

    Please Download Removal Tool:

    Save the file to a convenient location, such as your Windows desktop.
    Double-click "Antinyxem-EN.exe" to start the removal tool.

    The program will scan all running processes, and then you will be able to click the Scan button.
    Click Scan to begin the tool, and then allow it to run.

    Afterwards run Panda's ActiveScan for good measure:
    LVL 32

    Accepted Solution

    I would guess that the virus is not on your system.

    These days, almost all viruses use fake addresses for the "return" field. That way, the recipient has a hard time notifying the person who really has the infected PC.

    If the above scan have not shown a virus on your machine I would feel pretty confident that you have nothing more to do or worry about.

    If the bounce messages/complaints you got have a complete header with them you can sometimes figure out what IP address they originated at. It will prove that they did not come from you, but other than that there isn't a whole lot you can do.

    Featured Post

    Enabling OSINT in Activity Based Intelligence

    Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

    Join & Write a Comment

    The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
    Read about achieving the basic levels of HRIS security in the workplace.
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    730 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now