Terminating the Malware Program
This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier.
1. Open Windows Task Manager.
On Windows 9x/ME systems,
refer to the note* below.
On Windows NT/2000/XP systems, press
CTRL+SHIFT+ESC, and click the Processes tab.
2. In the list of running programs, locate the malware file or files detected earlier.
3. Select one of the detected files, then press the End Process button.
4. Do the same for all detected malware files in the list of running processes.
5. To check if the malware process has been terminated, close Task Manager, and then open it again.
6. Close Task Manager.
*NOTE: On systems running Windows 9x/ME, you need a third party process viewer, such as Process Explorer from Sysinternals. You may also continue with the next procedure, noting additional instructions.
Removing Autostart Entries from the Registry
Removing autostart entries from registry prevents the malware from executing during startup. You will need the name(s) of the file(s) detected earlier.
1. Open Registry Editor. To do this, click Start>Run, type REGEDIT, then press Enter.
2. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft>
4. In the right panel, locate and delete the entry or entries whose data value (in the rightmost column) is the malware file(s) detected earlier.
5. Close Registry Editor.
NOTE: If you were not able to terminate the malware process from memory as described in the previous procedure, restart your system in MS-DOS mode and delete the file(s)in the Startup folder detected as WORM_BUGBEAR.A. Afterwards, restart your system in normal Windows mode.