7AdPower Dialer Profile

7AdPower Dialer was first discovered on July 17 of 2004.  It was created by Madison Administration Inc.  Dialers intend nothing but stolen statistical data for unscrupulous Internet marketers and exploitation of the infected computer, which typically leads to extreme financial risks for the user.

7AdPower Dialer is installed on your computer invisibly by an ActiveX drive-by download.  It is also an ActiveX program in itself that downloads other Dialers.

7AdPower Dialer’s other way of attack is that it hijacks your dial-up modem to call long distance numbers or premium “900” numbers instead of the user’s typical Internet service provider, which is done invisibly and without the awareness or consent of the user.  This can result in huge phone bills that the user may be unaware of.  Madison Administration and the owner of the 900 number typically “split the take.”

7AdPower Dialer can also serve as a part of other malware programs.  Trojans, like Backdoors and Downloaders are common this way, and Worms will often use Dialers, too.  This function has become a more regular use for Dialers since dial-up modems are becoming obsolete.  In this context, it opens the connection to the website, usually using IRC technology.

If you discover that you are infected with 7AdPower Dialer (and hopefully not by charges on your phone bill), you should remove it with an antispyware program such as the award-winning ZookaWare PC Cleaner.  ZookaWare PC Cleaner guarantees 100% complete removal of 7AdPower Dialer.

Also Known As:
Dialer.7AdPower

Spyware Type:

Dialer, Trojan Downloader

Associated Files:

%System%\internazionale_ver4.ocx
%System%\belgio_ver3.ocx
%System%\emsat_ver2.ocx
%System%\belgio_ver2.ocx
%System%\objsafe.tlb
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9E98E84C-79E1-49C3-82EB-798FCD552EFB}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{970BF476-3CF2-4572-9EF9-4479E1591DB8}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EE20D8BE-C0A8-4585-B11A-4E4E264C95AB}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{12E919BC-C70F-432B-B831-1180DE734505}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{66BD1BD0-3655-42E4-8CE9-16D3613B0B25}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{929BB4FA-0AF1-4A01-A0AE-023F4B421DA2}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BF5B2E01-73BF-4AE4-8198-A8745C3235F6}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{69A5250D-6E72-46FD-95BD-7FE4F6191C0C}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9829CFE6-F89A-4A1A-8804-4DCA0BE27518}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{795EB484-BD6D-4125-93DB-D6FF015325E9}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1DD8DB5A-7EFC-48EC-8910-40A1AAA8D2F3}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{490C4042-5C17-4AC0-A046-000CB7FC0217}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VacPro.internazionale_ver4
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VacPro.belgio_ver3
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VacPro.belgio_ver2

Download Free Scan
Cyberlab runs on Windows Vista, 7, 8 and 10. It has no ads, popups or bundled software and fully uninstalls by clicking Start > All Programs > select Cyberlab and click Uninstall.

One Response

  1. Frida Vosgen says:

    The other day my Symantec Antivirus detected a dialer called Dialer.7AdPower. Its filename was int_ver34[1].CAB. The quarantine was only partially successful. I tried other programs, removal tools, but the virus was still there. Now I just found SpyZooka and I tried this too. It really helped. Is the first time when I hear about this program, but is really good.

Leave a Reply

Your email address will not be published.

Products

Contact

css.php