- 13 February 2007
- Risk Impact:
- File Names:
- Systems Affected:
Dialer.WebDialler is a third-party dialer application that an Internet site installs on a user system allowing users on that system access to restricted content by charging the access to the user's phone bill.
A small green icon, resembling a smiley face with big eyes, is visible in the lower-right corner of the screen (in the System Tray). Other symptoms include unusually high phone bills to unrecognized numbers.
Dialer.WebDialler does not install itself on to a users system. Instead, it is installed by a Web site that has purchased its service.
Antivirus Protection Dates
- Initial Rapid Release version 02 October 2014 revision 022
- Latest Rapid Release version 02 October 2014 revision 022
- Initial Daily Certified version 17 October 2003
- Latest Daily Certified version 28 September 2010 revision 036
- Initial Weekly Certified release date 22 October 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Dialer.WebDialler commonly resides in the folder %Program Files%\WebDialler, though it can be installed elsewhere.
Note: %Program Files% is a variable. The dialer locates the Windows Program Files folder (by default, this is C:\Program Files) and copies itself to that location.
During activation, Dialer.WebDialler commonly creates the value:
under the registry key
Additionally, Dialer.WebDialler also creates the registry tree
If Dialer.WebDialler finds AOL installed on the system, it uses the AOL program for its dialing.
- Uninstall the Dialer.WebDialler.
- Update the virus definitions.
- Close modem connections
- Run a full system scan and delete all the files detected as Dialer.WebDialler.
For specific details on each of these steps, read the following instructions.
1. Uninstalling the Dialer.WebDialler
Uninstall Dialer.WebDialler by right-clicking its icon in the lower-right corner of the screen (in the System Tray) and choosing Uninstall. Follow the prompts to complete the uninstallation.
2. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
- Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
- Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).
The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.
3. To close modem connections
This risk uses available modems to create an Internet connection, sometimes without any visible signs. In order to successfully remove this threat, ensure that all modem-based Internet connections are disconnected before proceeding. For instructions on how to do this, consult the appropriate Internet service provider, computer manufacturer, or operating system documentation.
4. Scanning for and deleting the infected files
- Start Norton AntiVirus and make sure that it is configured to scan all the files. For more information on how to do this, read the document, "How to configure Norton AntiVirus to scan all files."
- Run a full system scan.
- If any files are detected as infected with Dialer.WebDialler, click Delete.
Note: If you ran the Add/Remove programs applet as described in the previous section, it is possible that all files were removed and therefore none will be detected