Dialer.Dialpass
Dialer.Dialpass is not necessarily a computer virus however it can be used for malicious activities. Criminals can use Dialer.Dialpass to hijack a computer's modem and use it to access different websites by dialing high-cost phone numbers. Criminals often access porn related websites via Dialer.Dialpass. Dialer.Dialpass targets computer systems with dialup internet services however; users with broadband connection are not affected by it. Uninstall Dialer.Dialpass from your PC as soon as possible to avoid a huge debt on your hands.
Aliases
4 security vendors flagged this file as malicious.
Anti-Virus Software | Detection |
---|---|
- | Win-Trojan/Skintrim.178152 |
- | Trojan:Win32/Skintrim.N |
- | Mal/SkimTrim-B |
- | Skintrim.gen.f |
File System Details
Dialer.Dialpass may create the following file(s):
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | %ProgramFiles%\Instant Access\Multi\20100630070627\instant access.exe | |
2. | %System%\nsinet.exe | |
3. | %ProgramFiles%\Instant Access\Multi\20100630070627\medias\button3.gif | |
4. | %ProgramFiles%\Instant Access\Multi\20100630070627\js\js_api_dialer.php | |
5. | %ProgramFiles%\Instant Access\Multi\20100630070627\Common\module.php | |
6. | CommonDesktopDir%\SuperBabes.lnk | |
7. | %ProgramFiles%\Instant Access\Multi\20100630070627\medias\button4.gif | |
8. | %ProgramFiles%\Instant Access\Multi\20100630070627\medias\button1.gif | |
9. | %Windir%\dialerexe.ini | |
10. | %ProgramFiles%\Instant Access\Center\SuperBabes.lnk | |
11. | %ProgramFiles%\Instant Access\Multi\20100630070627\medias\dialer.ico | |
12. | %ProgramFiles%\Instant Access\Multi\20100630070627\medias\button2.gif | |
13. | %ProgramFiles%\Instant Access\Multi\20100630070627\dialerexe.ini | |
14. | %StartMenu%\SuperBabes.lnk | |
15. | %ProgramFiles%\Instant Access\DesktopIcons\SuperBabes.lnk |
Registry Details
Dialer.Dialpass may create the following registry entry or registry entries:
[HKEY_CURRENT_USER\Software\egdhtml]
(Default) = "%System%\nsinet.exe /run"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DF1C8E21-4045-4D67-B528-335F1A4F0DE9}\LocalServer32]
ExeStartFile = "%ProgramFiles%\Instant Access\Multi\20100630070627\Common\module.php"
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.