Dialer.Pornpaq - will not auto delete via NIS2005?

  Gizmocat 10:33 03 Jan 05
Locked

I have just installed NIS2005, and after full system scan the above threat has been detected.
However, it will not auto delete.
The help window advises me to write down path and file name, then use Windows Explorer to locate and delete file. Then I'm supposed to reverse changes to Registry.
I am not a computer whiz so can somebody please advise?
I do have an Anti Dialer prog on my desktop and the only connection allowed is my broadband. The dialer has been on my computer, apparently, since January 2004.
Do I really need to worry about fiddling around trying to delete it?

  Fruit Bat /\0/\ 10:52 03 Jan 05

Dialer.Pornpaq
Last Updated on: January 05, 2004 04:40:11 PM
Type: Dialer

Version: 6.1.0.0

Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP


Removal: Low
Damage: Low

This threat can be detected only by Symantec products that support expanded threats. For more information on expanded threats, please go here.



Behavior
When Dialer.Pornpaq is executed, and after accepting a licensing agreement, it attempts to access pornographic material by dialing a high-cost phone number using the modem.

Symptoms


The files are detected as Dialer.Pornpaq.
Pornographic icons are added to the desktop.


Transmission
The most common installation method for this dialer application is through various Web sites, mainly pornographic in nature.


File names: Hardcore.exe; Porn Turbo.exe

When Dialer.Pornpaq is executed, it does the following:

Copies itself as the following:

C:\Documents and Settings\Administrator\Desktop\Hardcore.exe

or:

C:\Documents and Settings\Administrator\Desktop\Porn Turbo.exe

Adds one or more of the following registry keys:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Hardcore
HKEY_CURRENT_USER\Software\Coulomb
HKEY_CURRENT_USER\Software\Coulomb\Hardcore

or:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Porn Turbo
HKEY_CURRENT_USER\Software\Coulomb
HKEY_CURRENT_USER\Software\Coulomb\Porn Turbo

Creates an icon on the Windows desktop.

A licensing agreement appears. If the user accepts the licensing agreement, the dialer will attempt to call a high-cost number using the modem.

Attempts to connect to a pornographic Web site.

REMOVAL
Restart the computer in Safe mode.
Run a full system scan and delete all the files detected as Dialer.Pornpaq.
Reverse the changes made to the registry.

Note: If your antivirus product reports that it cannot delete a detected file, write down the path and file name. Then use Windows Explorer to locate and delete the file.

Reversing the changes made to the registry



WARNING: strongly recommend that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only.

Click Start, and then click Run. (The Run dialog box appears.)
Type regedit

Then click OK. (The Registry Editor opens.)


Delete the following registry keys:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Hardcore
HKEY_CURRENT_USER\Software\Coulomb
HKEY_CURRENT_USER\Software\Coulomb\Hardcore

or:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Porn Turbo
HKEY_CURRENT_USER\Software\Coulomb
HKEY_CURRENT_USER\Software\Coulomb\Porn Turbo


d. Exit the Registry Editor

This thread is now locked and can not be replied to.

How to get Windows 10 for free | How to install Windows 10: There is still a way to avoid paying…

1995-2015: How technology has changed the world in 20 years

Alex Chinneck’s giant ice cube Christmas tree at Kings Cross

Apple rumours & predictions 2017: The iPhone 8, new iPads, and everything else you should expect fr7…