Press the CTRL key until the startup menu appears.
Choose the Safe Mode option then press Enter.
• On Windows NT (VGA mode)
Click Start>Settings>Control Panel.
Double-click the System icon.
Click the Startup/Shutdown tab.
Set the Show List field to 10 seconds and click OK to save this change.
Shut down and restart your computer.
Select VGA mode from the startup menu.
• On Windows 2000
Restart your computer.
Press the F8 key, when you see the Starting Windows bar at the bottom of the screen.
Choose the Safe Mode option from the Windows Advanced Options Menu then press Enter.
• On Windows XP
Restart your computer.
Press F8 after the Power-On Self Test (POST) is done. If the Windows Advanced Options Menu does not appear, try restarting and then pressing F8 several times after the POST screen.
Choose the Safe Mode option from the Windows Advanced Options Menu then press Enter.
• On Windows Server 2003
Restart your computer.
When you are prompted to select the operating system to start, press F8.
On the Windows Advanced Option menu, use the arrow keys to select Safe Mode, and then press Enter.
Editing the Registry
This malware modifies the system's registry. Users affected by this malware may need to modify or delete specific registry keys or entries. For detailed information regarding registry editing, please refer to the following articles from Microsoft:
Removing autostart entries from the registry prevents the malware from executing at startup.
If the registry entry below is not found, the malware may not have executed as of detection. If so, proceed to the succeeding solution set.
Open Registry Editor. Click Start>Run, type REGEDIT, then press Enter.
In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft> Windows>CurrentVersion>Run
In the right panel, locate and delete the entry: Intell32.exe = "%System%\intell32.exe" (Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, and C:\Windows\System32 on Windows XP and Server 2003.)
Close Registry Editor.
Deleting the Malware File(s)
Right-click Start then click Search... or Find..., depending on the version of Windows you are running.
In the Named input box, type the file name detected earlier.
In the Look In drop-down list, select the drive that contains Windows, then press Enter.
Once located, select the file then press Delete.
Repeat the above instructions for multiple files.
Important Windows ME/XP Cleaning Instructions
Users running Windows ME and XP must disable System Restore to allow full scanning of infected systems.
Users running other Windows versions can proceed with the succeeding procedure set(s).
Running Trend Micro Antivirus
If you are currently running on safe mode, please restart your system normally before performing the following solution.
Scan your system with Trend Micro antivirus and delete files detected as TROJ_ALEMOD. To do this, Trend Micro customers must download the latest virus pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's online virus scanner.
murs
3 Posts
0
October 22nd, 2006 08:00
zbestwun2001
3 Apprentice
•
8.8K Posts
0
October 22nd, 2006 16:00
HJT Forum
Click HERE to download a self-extractable version of HijackThis.
- Double click on hijackthis.exe to extract hijackthis to folder c:\hijackthis.
- It will extract it to that folder and open the folder for you.
- It will also create a shortcut on your desktop to HijackThis.
- It will scan and the log should open in notepad.Click on "Edit > Select
- All" then click on "Edit > Copy" to copy the entire contents of the
- log.
Do not have HijackThis fix anything yet. Most of what it finds will be harmless or even required.thanks,
ZB1
Nickrulz
36 Posts
0
October 26th, 2006 07:00
Identifying the Malware Program
To remove this malware, first identify the malware program.
Trend Micro customers need to download the latest virus pattern file before scanning their system. Other users can use Housecall, the Trend Micro online virus scanner.
Restarting in Safe Mode
• On Windows 98 and ME
• On Windows NT (VGA mode)
• On Windows 2000
• On Windows XP
• On Windows Server 2003
Editing the Registry
This malware modifies the system's registry. Users affected by this malware may need to modify or delete specific registry keys or entries. For detailed information regarding registry editing, please refer to the following articles from Microsoft:
Removing Autostart Entries from the Registry
Removing autostart entries from the registry prevents the malware from executing at startup.
If the registry entry below is not found, the malware may not have executed as of detection. If so, proceed to the succeeding solution set.
HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>
Windows>CurrentVersion>Run
Intell32.exe = "%System%\intell32.exe"
(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, and C:\Windows\System32 on Windows XP and Server 2003.)
Deleting the Malware File(s)
Important Windows ME/XP Cleaning Instructions
Users running Windows ME and XP must disable System Restore to allow full scanning of infected systems.
Users running other Windows versions can proceed with the succeeding procedure set(s).
Running Trend Micro Antivirus
If you are currently running on safe mode, please restart your system normally before performing the following solution.
Scan your system with Trend Micro antivirus and delete files detected as TROJ_ALEMOD. To do this, Trend Micro customers must download the latest virus pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's online virus scanner.
zbestwun2001
3 Apprentice
•
8.8K Posts
0
October 26th, 2006 13:00