1. Symantec/
  2. Security Response/
  3. W32.Vote.gen@mm

W32.Vote.gen@mm - Removal

Risk Level 2: Low

September 27, 2001
February 13, 2007 11:46:51 AM
Systems Affected:

To remove this worm, delete files that are detected as W32. Vote.A@mm and W32.Vote.B@mm and remove the value that the worm added to the registry. You may need to replace the .htm and .html files.

To remove the worm:
  1. Run LiveUpdate to make sure that you have the most recent virus definitions.
  2. Start Norton AntiVirus (NAV), and make sure that NAV is configured to scan all files. For instructions on how to do this, read the document How to configure Norton AntiVirus to scan all files.
  3. Run a full system scan.
  4. Delete all files that are detected as W32.Vote.gen@mm, W32.Vote.A@mm, or W32.Vote.B@mm.
  5. Reset the Internet Explorer home page
  6. If the computer was restarted after the infection, or if the computer seems very unstable, we recommend that you reinstall the operating system.

To edit the registry:

CAUTION: We strongly recommend that you back up the system registry before you make any changes. Incorrect changes to the registry could result in permanent data loss or corrupted files. Please make sure that you modify only the keys that are specified. Please see the document How to back up the Windows registry before you proceed.
  1. Click Start, and click Run. The Run dialog box appears.
  2. Type regedit and then click OK. The Registry Editor opens.
  3. Navigate to the following key:

  4. In the right pane, delete the following values:

    ZaCker = \%Windows\System%\DaLaL.vbs
    ALWaiL = \%Windows\System%\WaiL.vbs

  5. Click Registry, and then click Exit.

To reset the Internet Explorer home page:
  1. Start Microsoft Internet Explorer.
  2. Connect to the Internet, and go to the page that you want to set as your home page.
  3. Click Tools, and click Internet Options.
  4. On the General tab, click Use Current, and then click OK.

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube