PDA

View Full Version : Manual Removal Guide for DoubleD



Friday
2009-07-29, 17:53
The following instructions have been created to help you to get rid of "DoubleD" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.

If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).

Threat Details:

Categories:
pups

Description:
DoubleD produces various mostly unwanted browser toolbars. When such a toolbar is installed on the system it sends a lot of personal information to one of the DoubleD's servers.
Removal Instructions:

Installed Software List:

You can try to uninstall products with the names listed below; for items identified by other properties or to avoid malware getting active again on uninstallation, use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) or RunAlyzer (http://www.safer-networking.org/index.php?page=runalyzer) to locate and get rid of these entries.

Products that have a key or property named "Double D Toolbar".

Files:

Please use Windows Explorer or another file manager of your choice to locate and delete these files.

The file at "<$LOCALAPPDATA>\Conduit\Community Alerts\LanguagePacks\en.xml".
The file at "<$LOCALAPPDATA>\Double_D\LanguagePack.xml".
The file at "<$LOCALAPPDATA>\Double_D\LocalSettings.txt".
The file at "<$LOCALAPPDATA>\Double_D\RadioPlayer\IP_Stations_Media_List.xml".
The file at "<$LOCALAPPDATA>\Double_D\ThirdPartyComponents.xml".
The file at "<$PROGRAMFILES>\Conduit\Community Alerts\Alert.dll".
The file at "<$PROGRAMFILES>\Double_D\INSTALL.LOG".
The file at "<$PROGRAMFILES>\Double_D\toolbar.cfg".
The file at "<$PROGRAMFILES>\DoubleD\Desktop Smiley Toolbar\1.3.0.840\ssd.dll".
The file at "<$PROGRAMFILES>\DoubleD\GamingHarbor Toolbar\4.1.4.20920\stbapp.exe".
The file at "<$PROGRAMFILES>\DoubleD\GamingHarbor Toolbar\4.1.4.20920\stbappHelper.exe".
The file at "<$PROGRAMFILES>\DoubleD\GamingHarbor Toolbar\4.1.4.20920\stbsvc.exe".
The file at "<$PROGRAMFILES>\Internet Saving Optimizer\3.4.0.4340\NPIEAddOn.dll".
The file at "<$PROGRAMFILES>\Media Access Startup\1.5.0.850\HPIEAddOn.dll".
The file at "<$PROGRAMFILES>\System Search Dispatcher\1.3.0.840\ssd.dll".
The file at "<$PROGRAMFILES>\System Search Dispatcher\1.3.0.840\stb1.dll".
Make sure you set your file manager to display hidden and system files. If DoubleD uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!

Important: There are more files that cannot be safely described in simple words. Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) to remove them.

Folders:

Please use Windows Explorer or another file manager of your choice to locate and delete these folders.

The directory at "<$LOCALAPPDATA>\Conduit\Community Alerts\Feeds".
The directory at "<$LOCALAPPDATA>\Conduit\Community Alerts\LanguagePacks".
The directory at "<$LOCALAPPDATA>\Conduit\Community Alerts\Log".
The directory at "<$LOCALAPPDATA>\Conduit\Community Alerts".
The directory at "<$LOCALAPPDATA>\Conduit".
The directory at "<$LOCALAPPDATA>\Double_D\CacheIcons".
The directory at "<$LOCALAPPDATA>\Double_D\EmailNotifier".
The directory at "<$LOCALAPPDATA>\Double_D\Logs".
The directory at "<$LOCALAPPDATA>\Double_D\MyStuffComponents".
The directory at "<$LOCALAPPDATA>\Double_D\RadioPlayer".
The directory at "<$LOCALAPPDATA>\Double_D\Rss".
The directory at "<$LOCALAPPDATA>\Double_D".
The directory at "<$PROGRAMFILES>\Conduit\Community Alerts".
The directory at "<$PROGRAMFILES>\Conduit".
The directory at "<$PROGRAMFILES>\Double_D".
The directory at "<$PROGRAMFILES>\DoubleD\Desktop Smiley Toolbar\1.3.0.840".
The directory at "<$PROGRAMFILES>\DoubleD\Desktop Smiley Toolbar".
The directory at "<$PROGRAMFILES>\DoubleD\GamingHarbor Toolbar\4.1.4.20920".
The directory at "<$PROGRAMFILES>\DoubleD\GamingHarbor Toolbar".
The directory at "<$PROGRAMFILES>\DoubleD".
The directory at "<$PROGRAMFILES>\Internet Saving Optimizer\3.4.0.4340".
The directory at "<$PROGRAMFILES>\Internet Saving Optimizer".
The directory at "<$PROGRAMFILES>\Media Access Startup\1.5.0.850".
The directory at "<$PROGRAMFILES>\Media Access Startup".
The directory at "<$PROGRAMFILES>\System Search Dispatcher\1.3.0.840".
The directory at "<$PROGRAMFILES>\System Search Dispatcher".
Make sure you set your file manager to display hidden and system files. If DoubleD uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify folders!

Registry:

You can use regedit.exe (included in Windows) to locate and delete these registry entries.

Delete the registry key "{25B8D58C-B0CB-46b0-BA64-05B3804E4E86}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\".
Delete the registry key "{25B8D58C-B0CB-46b0-BA64-05B3804E4E86}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\".
Delete the registry key "{35B8D58C-B0CB-46b0-BA64-05B3804E4E86}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\".
Delete the registry key "{35B8D58C-B0CB-46b0-BA64-05B3804E4E86}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\".
Delete the registry key "{3c471948-f874-49f5-b338-4f214a2ee0b1}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{5617ECA9-488D-4BA2-8562-9710B9AB78D2}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\".
Delete the registry key "{7157F1C6-90E1-449C-9AC8-88B1236FC6F8}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{7157f1c6-90e1-449c-9ac8-88b1236fc6f8}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\".
Delete the registry key "{8ADDFA4B-207C-4C07-8FA1-DE1C3A2FA3A9}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{CDBFB47B-58A8-4111-BF95-06178DCE326D}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\".
Delete the registry key "{CDBFB47B-58A8-4111-BF95-06178DCE326D}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\".
Delete the registry key "Community Alerts" at "HKEY_CURRENT_USER\Software\Conduit\".
Delete the registry key "Community Alerts" at "HKEY_LOCAL_MACHINE\SOFTWARE\Conduit\".
Delete the registry key "Toolbar" at "HKEY_CURRENT_USER\Software\Conduit\".
Delete the registry key "toolbar" at "HKEY_CURRENT_USER\Software\Double_D\".
Delete the registry key "toolbar" at "HKEY_LOCAL_MACHINE\SOFTWARE\Double_D\".
Delete the registry key "Toolbars" at "HKEY_LOCAL_MACHINE\SOFTWARE\Conduit\".
Delete the registry value "{5617ECA9-488D-4BA2-8562-9710B9AB78D2}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\".
Delete the registry value "{7157F1C6-90E1-449C-9AC8-88B1236FC6F8}" at "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\".
Delete the registry value "{7157f1c6-90e1-449c-9ac8-88b1236fc6f8}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\".
If DoubleD uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).

Browser:

The following browser plugins or items can either be removed directly in your browser, or through the help of e.g. Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) or RunAlyzer (http://www.safer-networking.org/index.php?page=runalyzer).

Please remove Browser Helpers named "Desktop Smiley Toolbar".
Please remove Browser Helpers named "GamingHarbor Toolbar".

Final Words:

If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.