Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.



13 February 2007
Risk Impact:
File Names:
Systems Affected:


Dialer.Crosskirk is a dialer application that can be used to access various material by dialing high-cost numbers using a modem. Most of the material that can be accessed is pornographic.


  • A Web page appears inviting you to access pornographic services using a premium-rate phone number.
  • The files are detected as Dialer.Crosskirk.


The most common installation method for this dialer application is through various Web sites, mainly pornographic Web sites.

Antivirus Protection Dates

  • Initial Rapid Release version 02 October 2014 revision 022
  • Latest Rapid Release version 15 September 2019 revision 019
  • Initial Daily Certified version 17 September 2003
  • Latest Daily Certified version 15 August 2019 revision 002
  • Initial Weekly Certified release date 17 September 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

When Dialer.Crosskirk is executed, it performs the following actions:
  1. Copies itself as one of the following:

    • C:\Program Files\Webdialer\Kernel32.exe
    • C:\Program Files\Webdialer\od-teen278.exe
    • C:\Program Files\Webdialer\od-stnd243.exe
    • C:\Program Files\Webdialer\od-stnd550.exe
    • C:\Program Files\Webdialer\od-stnd433.exe
    • C:\Program Files\Webdialer\od-stnd246.exe
    • C:\Program Files\Webdialer\od-stnd67.exe
    • C:\Program Files\Webdialer\od-stnd609.exe
    • C:\Program Files\Webdialer\od-stnd18.exe
    • C:\Program Files\Webdialer\od-stnd24.exe
    • C:\Program Files\Webdialer\od-stnd433.exe
    • C:\Program Files\Webdialer\od-stnd59.exe
    • C:\Program Files\Webdialer\od-stnd540.exe
    • C:\Program Files\Webdialer\od-stnd551.exe
    • C:\Program Files\Webdialer\od-stnd520.exe
    • C:\Program Files\Webdialer\od-stnd12.exe
    • C:\Program Files\Webdialer\od-teen52.exe
    • C:\Program Files\Webdialer\od-teen271.exe
    • C:\Program Files\Webdialer\od-teen278.exe
    • C:\Program Files\Webdialer\od-teen236.exe
    • C:\Program Files\Webdialer\od-teen88.exe
    • C:\Program Files\Webdialer\od-matr23.exe
    • C:\Program Files\Webdialer\od-matr58.exe
    • C:\Program Files\Webdialer\od-teen52.exe
    • C:\Program Files\Webdialer\od-asia9.exe
    • C:\Program Files\Webdialer\14-0-0-116.exe
    • C:\Program Files\Webdialer\5-4-99-1.exe
    • C:\Program Files\Webdialer\st-hc0005.exe
    • %Windir%\menf0061.exe
    • %Windir%\tlk0265.exe
    • %Windir%\tlk0209.exe
    • %Windir%\5-1-5-11.exe
    • %Windir%\5-2-158-14.exe
    • %Windir%\5-6-100-105.exe
    • %Windir%\5-2-148-8.exe
    • %Windir%\5-2-158-12.exe
    • %Windir%\5-2-27-25.exe

      There are other similar files with similar names that are also Dialer.CrossKirk, such as sexygay.gif and kernel32.exe.

      Note: %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.

  2. Creates a link to the above file on the Windows desktop and adds itself to the Start Menu.

  3. Adds the subkey:


    to the following key:


  4. Adds one of these subkeys:


    where %Filename% is the name of the file such as "tlk0209.exe"

    to the registry key:


  5. Adds one of these values:

    "%FileName%"="%PathtoFile% -m"
    where %FileName% is something such as "tlk0209.exe" and %PathtoFile% is something such as "%Windir%\tlk209.exe"

    to the registry key:


The Sexgay.gif file is, despite the .gif extension, an executable program. It contains Dialer.Crosskirk and, when executed, extracts and runs Dialer.Crosskirk.

The following instructions pertain to all Symantec antivirus products that support Security Risk detection.
  1. Update the definitions.
  2. Close modem connections
  3. Run a full system scan and delete all the files detected as Dialer.Crosskirk .
  4. Delete the values that were added to the registry.
For specific details on each of these steps, read the following instructions.

1. To update the definitions
To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

2. To close modem connections
This risk uses available modems to create an Internet connection, sometimes without any visible signs. In order to successfully remove this threat, ensure that all modem-based Internet connections are disconnected before proceeding. For instructions on how to do this, consult the appropriate Internet service provider, computer manufacturer, or operating system documentation.

3. To scan for and delete the files
  1. Start Norton AntiVirus and make sure that it is configured to scan all the files. For more information, read the document, "How to configure Norton AntiVirus to scan all files."
  2. Run a full system scan.
  3. If any files are detected as Dialer.Crosskirk, click Delete.

    Note: If your Symantec antivirus product reports that it cannot delete a detected file, write down the path and file names. Then use Windows Explorer to locate and delete the file.

4. To delete the values from the registry
Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.
  1. Click Start > Run.
  2. Type regedit

    Then click OK.

  3. Navigate to the key:


  4. In the right pane, delete any of these values:

    "%FileName%"="%PathtoFile% -m"
    where %FileName% is something such as "tlk0209.exe" and %PathtoFile% is something such as "%Windir%\tlk209.exe"

  5. Navigate to the key:


  6. In the right pane, delete any of these subkeys:


    where %Filename% is the name of the file such as "tlk0209.exe"

  7. Navigate to and delete the following key:


  8. Exit the registry Editor.