Dialer.SwitchDialer

Printer Friendly Page

Updated: February 13, 2007 11:36:21 AM
Type: Dialer
Risk Impact: High
File Names: Varies
Systems Affected: Windows

Behavior


Dialer.SwitchDialer is a dialer program that can be used to access various material by dialing high-cost numbers using a modem. Most of the accessible material is pornographic.

Symptoms


Your Symantec antivirus program detects this threat as Dialer.SwitchDialer.

Transmission


The most common installation method of this dialer is through various Web sites, mainly pornographic in nature.

Antivirus Protection Dates

  • Initial Rapid Release version October 02, 2014 revision 022
  • Latest Rapid Release version February 01, 2015 revision 020
  • Initial Daily Certified version December 29, 2003
  • Latest Daily Certified version September 28, 2010 revision 036
  • Initial Weekly Certified release date December 31, 2003

Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Updated: February 13, 2007 11:36:21 AM
Type: Dialer
Risk Impact: High
File Names: Varies
Systems Affected: Windows


When Dialer.SwitchDialer is executed, it performs the following actions:

  1. Copies itself to the %System% folder using the same name as the file that was originally run on the computer.


    Note: %System% is a variable. The dialer locates the System folder and copies itself to that location. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

  2. Adds some of the following folders:

    • %ProgramFiles%\Make125
    • %ProgramFiles%\Make125\Portal
    • %ProgramFiles%\Plus18Point
    • %ProgramFiles%\Plus18Point\Portal
    • %ProgramFiles%\FirstEnter
    • %ProgramFiles%\FirstEnter\Portal
    • %ProgramFiles%\QuickPage
    • %ProgramFiles%\QuickPage\Portal

  3. Adds some of the following subkeys:

    HKEY_CLASSES_ROOT\.cxq
    HKEY_CLASSES_ROOT\.mxq
    HKEY_CLASSES_ROOT\cxqfile
    HKEY_LOCAL_MACHINE\SOFTWARE\Startportal
    HKEY_LOCAL_MACHINE\SOFTWARE\SwitchDialer
    HKEY_LOCAL_MACHINE\SOFTWARE\Make125
    HKEY_LOCAL_MACHINE\SOFTWARE\Plus18Point
    HKEY_LOCAL_MACHINE\SOFTWARE\FirstEnter
    HKEY_LOCAL_MACHINE\SOFTWARE\QuickPage
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{5CBF8C22-E9A6-11D7-90FE-000AE4012DB4}
    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-callswitch
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Switch

  4. Adds one of the following values:

    "Diskstart" = "%System%\<filename>"
    "sVideo2" = "%System%\<filename>"
    "Quicktlme" = "%System%\<filename>"
    "Classes" = "%System%\<filename>"
    "CLSID" = "%System%\<filename>"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

    so that the dialer runs when you start Windows.

  5. Adds the value:

    "{5CBF8C22-E9A6-11D7-90FE-000AE4012DB4}" = "{5CBF8C22-E9A6-11D7-90FE-000AE4012DB4}!1,0,0,2"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\ClsidFeature

  6. Adds the value:

    "*.ffx23wl.nl" = ""

    to the registry subkey:

    HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\New Windows\Allow

  7. Adds the values:

    "TYPE34" = "application/x-callswitch"
    "application/x-callswitch" = "%System%\<filename>"

    to the registry subkey:

    HKEY_CURRENT_USER\SOFTWARE\Netscape\Netscape Navigator\Viewers

  8. Adds the value:

    "%System%\<filename>" = "Yes"

    to the registry subkey:

    HKEY_CURRENT_USER\SOFTWARE\Netscape\Netscape Navigator\User Trusted External Applications

  9. Adds the value:

    "" = "%System%\<filename>" "%1"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\Software\Classes\Classes\shell\open\command

  10. Adds the value:

    "" = "%System%\<filename>" "%1"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\Software\Javascrlpt\Classes\shell\open\command

Updated: February 13, 2007 11:36:21 AM
Type: Dialer
Risk Impact: High
File Names: Varies
Systems Affected: Windows


The following instructions pertain to all Symantec antivirus products that support Security Risk detection.

  1. Update the definitions.
  2. Close modem connections
  3. Run a full system scan and delete all the files detected as Dialer.SwitchDialer.
  4. Reverse the changes that were made to the registry.
  5. Delete the files and folders created by the risk.
For specific details on each of these steps, read the following instructions.

1. Updating the definitions
To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

2. To close modem connections
This risk uses available modems to create an Internet connection, sometimes without any visible signs. In order to successfully remove this threat, ensure that all modem-based Internet connections are disconnected before proceeding. For instructions on how to do this, consult the appropriate Internet service provider, computer manufacturer, or operating system documentation.

3. Scanning for and deleting the files
  1. Start your Symantec antivirus program and run a full system scan.
  2. If any files are detected as Dialer.SwitchDialer, click Delete.


    Note: If your Symantec antivirus product reports that it cannot delete a detected file, write down the path and file name. Then use Windows Explorer to locate and delete the file.
4. Reversing the changes made to the registry


WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.
  1. Click Start, and then click Run. (The Run dialog box appears.)

  2. Type regedit

    Then click OK. (The Registry Editor opens.)

  3. Navigate to and delete the following subkeys if they exist:

    HKEY_CLASSES_ROOT\.cxq
    HKEY_CLASSES_ROOT\.mxq
    HKEY_CLASSES_ROOT\cxqfile
    HKEY_LOCAL_MACHINE\Software\Startportal
    HKEY_LOCAL_MACHINE\Software\SwitchDialer
    HKEY_LOCAL_MACHINE\Software\Make125
    HKEY_LOCAL_MACHINE\Software\Plus18Point
    HKEY_LOCAL_MACHINE\Software\FirstEnter
    HKEY_LOCAL_MACHINE\Software\QuickPage
    HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components\{5CBF8C22-E9A6-11D7-90FE-000AE4012DB4}
    HKEY_LOCAL_MACHINE\Software\Classes\MIME\Database\Content Type\application/x-callswitch
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Switch

  4. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  5. In the right pane, delete the value:

    "Diskstart" = "%System%\<filename>"
    "sVideo2" = "%System%\<filename>"
    "Quicktlme" = "%System%\<filename>"
    "Classes" = "%System%\<filename>"
    "CLSID" = "%System%\<filename>"

  6. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\ClsidFeature

  7. In the right pane, delete the value:

    "{5CBF8C22-E9A6-11D7-90FE-000AE4012DB4}" = "{5CBF8C22-E9A6-11D7-90FE-000AE4012DB4}!1,0,0,2"

  8. Navigate to the key:

    HKEY_CURRENT_USER\SOFTWARE\Netscape\Netscape Navigator\Viewers

  9. In the right pane, delete the value:

    "TYPE34" = "application/x-callswitch"
    "application/x-callswitch" = "%System%\<filename>"

  10. Navigate to the key:

    HKEY_CURRENT_USER\SOFTWARE\Netscape\Netscape Navigator\User Trusted External Applications

  11. In the right pane, delete the value:

    "%System%\<filename>" = "Yes"

  12. Navigate to the key:

    HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\New Windows\Allow

  13. In the right pane, delete the value:

    "*.ffx23wl.nl" = ""

  14. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Javascrlpt\Classes\shell\open\command

  15. In the right pane, delete the value:

    "" = "%System%\<filename>" "%1"

  16. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Classes\Classes\shell\open\command

  17. In the right pane, delete the value:

    "" = "%System%\<filename>" "%1"

  18. Exit the Registry Editor.

5. Delete files and folders created by the risk
  1. Click Start > Programs > Accessories > Windows Explorer
  2. Navigate to and delete the following folders, if they exist:
    • %ProgramFiles%\Make125
    • %ProgramFiles%\Plus18Point
    • %ProgramFiles%\FirstEnter
    • %ProgramFiles%\QuickPage