I have a major problem! I am an advanced computer user that can't solve this one yet... Hopefully you can help. I keep getting the error message, 'application cannon be run in Win32 mode'. I get it whenever I try to launch a program, install a program, use the run command, even when I'm in Safe Mode. My Antivirus and Firewall programs are no longer in my sys tray and they are no longer running. Any help would be greatly appreciated. Thanks, Shea
a 6ya Technician can help you resolve that issue over the phone in a minute or two.
Best thing about this new service is that you are never placed on hold and get to talk to real repair professionals here in the US. click here to Talk to a Technician (only for users in the US for now) and get all the help you need. Goodluck!
- If you need clarification, ask it in the comment box above.
- Better answers use proper spelling and grammar.
- Provide details, support with references or personal experience.
Tell us some more! Your answer needs to include more details to help people.You can't post answers that contain an email address.Please enter a valid email address.The email address entered is already associated to an account.Login to postPlease use English characters only.
Tip: The max point reward for answering a question is 15.
Theres not many information regarding Win32 Tour Application. It will show you phone numbers to call i believe.
Sadly theres not many that have solved this problem too. If you can boot to safe mode (by pressing F8 during initial boot) then try running your antivirus from there.
I would suggest downloading the free version from malwarebytes.org.
If that would not solve the problem reformating and reinstalling your OS will be the best move.
When the executable is run on the victim's machine, the worm copies itself to the following locations:
%Application Data%\remove.exe (Copy of itself)
Where %Application Data% = c:\Documents and Settings\All Users\Application Data Autorun.inf has following command Exp: [autorun] shellExecute=remove.exe The worm adds a Run entry in registry so that it executes itself at every startup:
Method of InfectionMethod of Infection - This worm spreads by using autorun.inf on shared drives and removable devices. Removal - A combination of the latest DATs and the Engine will be able to detect and remove this threat. AVERT recommends users not to trust seemingly familiar or safe file icons, particularly when received via P2P clients, IRC, email or other media where users can share files.