PDA

View Full Version : Manual Removal Guide for DealPly



Friday
2013-07-03, 14:31
The following instructions have been created to help you to get rid of "DealPly" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.

If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).

Threat Details:

Categories:
pups

Description:
DealPly gets installed beside the Babylon toolbar, it is also bundled with other adware. It is installed without proper options to deny installation.
Links (be careful!):

: ttp://www.dealply.com/
Removal Instructions:

Installed Software List:

You can try to uninstall products with the names listed below; for items identified by other properties or to avoid malware getting active again on uninstallation, use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) or RunAlyzer (http://www.safer-networking.org/index.php?page=runalyzer) to locate and get rid of these entries.

Products that have a key or property named "DealPly".

Files:

Please use Windows Explorer or another file manager of your choice to locate and delete these files.

The file at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\chrome.manifest".
The file at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\chrome\content\dealplyshopping.xul".
The file at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\chrome\content\images\icon32.png".
The file at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\defaults\preferences\defaults.js".
The file at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\install.rdf".
The file at "<$COMMONAPPDATA>\DealPlyLive\Update\Log\DealPlyLive.log".
The file at "<$LOCALSETTINGS>\Temp\is1971879534\319053_Setup.CIS.part".
The file at "<$LOCALSETTINGS>\Temp\is1971879534\319053_Setup.CIS".
The file at "<$LOCALSETTINGS>\Temp\is1971879534\dp.exe".
The file at "<$PROGRAMFILES>\DealPly\DealPly.crx".
The file at "<$PROGRAMFILES>\DealPly\DealPly.xpi".
The file at "<$PROGRAMFILES>\DealPly\DealPlyIE.dll".
The file at "<$PROGRAMFILES>\DealPly\DealPlyUpdateVer.exe".
The file at "<$PROGRAMFILES>\DealPly\icon.ico".
The file at "<$PROGRAMFILES>\DealPly\uninst.exe".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\DealPlyLive.exe".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\DealPlyLiveBroker.exe".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\DealPlyLiveHandler.exe".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\DealPlyLiveHelper.msi".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\DealPlyLiveOnDemand.exe".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdate.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_am.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_ar.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_bg.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_bn.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_ca.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_cs.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_da.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_de.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_el.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_en.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_en-GB.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_es.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_es-419.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_et.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_fa.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_fi.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_fil.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_fr.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_gu.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_hi.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_hr.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_hu.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_id.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_is.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_it.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_iw.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_ja.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_kn.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_ko.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_lt.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_lv.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_ml.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_mr.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_ms.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_nl.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_no.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0\goopdateres_pl.dll".
The file at "<$PROGRAMFILES>\DealPlyLive\Update\DealPlyLive.exe".
The file at "<$PROGRAMS>\DealPly\DealPly Help.url".
The file at "<$PROGRAMS>\DealPly\DealPly.url".
The file at "<$PROGRAMS>\DealPly\Uninstall DealPly.lnk".
Make sure you set your file manager to display hidden and system files. If DealPly uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!

Important: There are more files that cannot be safely described in simple words. Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) to remove them.

Folders:

Please use Windows Explorer or another file manager of your choice to locate and delete these folders.

The directory at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\chrome\content\images".
The directory at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\chrome\content".
The directory at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\chrome".
The directory at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\defaults\preferences".
The directory at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}\defaults".
The directory at "<$APPDATA>\Mozilla\Firefox\Profiles\anibwtkr.default\extensions\{906000a4-88d9-4d52-b209-7a772970d91f}".
The directory at "<$COMMONAPPDATA>\DealPlyLive\Update\Log".
The directory at "<$COMMONAPPDATA>\DealPlyLive\Update".
The directory at "<$COMMONAPPDATA>\DealPlyLive".
The directory at "<$LOCALAPPDATA>\DealPlyLive\CrashReports".
The directory at "<$LOCALAPPDATA>\DealPlyLive".
The directory at "<$LOCALSETTINGS>\Temp\is1971879534".
The directory at "<$PROGRAMFILES>\DealPly".
The directory at "<$PROGRAMFILES>\DealPlyLive\CrashReports".
The directory at "<$PROGRAMFILES>\DealPlyLive\Update\1.3.23.0".
The directory at "<$PROGRAMFILES>\DealPlyLive\Update\Download".
The directory at "<$PROGRAMFILES>\DealPlyLive\Update\Install".
The directory at "<$PROGRAMFILES>\DealPlyLive\Update\Offline\{E2E05B0F-6153-48C7-B2C4-5553760B9F59}".
The directory at "<$PROGRAMFILES>\DealPlyLive\Update\Offline".
The directory at "<$PROGRAMFILES>\DealPlyLive\Update".
The directory at "<$PROGRAMFILES>\DealPlyLive".
The directory at "<$PROGRAMS>\DealPly".
Make sure you set your file manager to display hidden and system files. If DealPly uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify folders!

Registry:

You can use regedit.exe (included in Windows) to locate and delete these registry entries.

A key in HKEY_CLASSES_ROOT\ named "DealPlyLive.OneClickCtrl.9", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLive.OneClickProcessLauncherMachine.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLive.OneClickProcessLauncherMachine", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLive.Update3WebControl.3", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.CoCreateAsync.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.CoCreateAsync", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.CoreClass.1", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.CoreClass", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.CoreMachineClass.1", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.CoreMachineClass", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.CredentialDialogMachine.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.CredentialDialogMachine", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.OnDemandCOMClassMachine.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.OnDemandCOMClassMachine", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.OnDemandCOMClassMachineFallback.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.OnDemandCOMClassMachineFallback", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.OnDemandCOMClassSvc.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.OnDemandCOMClassSvc", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.ProcessLauncher.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.ProcessLauncher", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.Update3COMClassService.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.Update3COMClassService", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.Update3WebMachine.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.Update3WebMachine", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.Update3WebMachineFallback.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.Update3WebMachineFallback", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.Update3WebSvc.1.0", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "DealPlyLiveUpdate.Update3WebSvc", plus associated values.
Delete the registry key "@tools.dpliveupdate.com/DealPlyLive Update;version=3" at "HKEY_LOCAL_MACHINE\SOFTWARE\MozillaPlugins\".
Delete the registry key "@tools.dpliveupdate.com/DealPlyLive Update;version=9" at "HKEY_LOCAL_MACHINE\SOFTWARE\MozillaPlugins\".
Delete the registry key "{0D89DE71-3D99-4288-84DC-F18F1047A7D8}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{1E0C9B2A-6447-452C-B012-2314A0C29412}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{34A8CEB6-89BB-49F1-B5E4-0D0D6C21F3B1}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{3A4DBD3A-98CC-41CE-AD21-352D42B6F754}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{4F8A50F6-69DE-4BE3-A33A-A1079B9AC0DB}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{501CB57A-D4E2-4855-96AD-EDB0A9083395}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{6FF2C4DD-77A4-4BB5-BA4C-B42DEFBF9137}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{7F1796B2-BEC6-427B-B734-F9C75ED94A80}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{80FABB17-63AF-4655-9F07-B6509EE37AF2}" at "HKEY_CLASSES_ROOT\AppID\".
Delete the registry key "{80FABB17-63AF-4655-9F07-B6509EE37AF2}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{83ABA270-8390-4CA6-AE48-FC089F55629E}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{8B218A5F-1A3D-4347-94EF-A79575EB8094}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{8C338DDB-19FC-4C1F-B74D-6931EE55F7A1}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{9BDB5E09-4BBA-4422-8C2B-529B281C32B8}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{ae48ed75-5a56-4c5f-bbce-6f1ac3875f66}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{C536F080-57B7-46D6-8894-C647553F2889}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{CA5D945F-E738-4D0B-A0B5-25AC51C64659}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{F48FC5B2-094A-44C7-B48C-289738C9582D}" at "HKEY_CLASSES_ROOT\AppID\".
Delete the registry key "{F48FC5B2-094A-44C7-B48C-289738C9582D}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{F7698761-4ABA-45C2-A5BB-D2163922C725}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{FFCC53E6-2655-47FC-A89B-54E8D7F305D1}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "application/x-vnd.dpliveupdate.oneclickctrl.9" at "HKEY_CLASSES_ROOT\MIME\Database\Content Type\".
Delete the registry key "application/x-vnd.dpliveupdate.update3webcontrol.3" at "HKEY_CLASSES_ROOT\MIME\Database\Content Type\".
Delete the registry key "DealPly" at "HKEY_CURRENT_USER\Software\".
Delete the registry key "DealPly" at "HKEY_LOCAL_MACHINE\SOFTWARE\".
Delete the registry key "DealPlyLive.exe" at "HKEY_CLASSES_ROOT\AppID\".
Delete the registry key "DealPlyLive.exe" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\".
Delete the registry key "DealPlyLive" at "HKEY_CURRENT_USER\Software\".
Delete the registry key "DealPlyLive" at "HKEY_LOCAL_MACHINE\SOFTWARE\".
Delete the registry key "dealplylive" at "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\".
Delete the registry key "dealplylivem" at "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\".
Delete the registry value "AppName" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7F1796B2-BEC6-427B-B734-F9C75ED94A80}\".
Delete the registry value "AppName" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8C338DDB-19FC-4C1F-B74D-6931EE55F7A1}\".
Delete the registry value "AppPath" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7F1796B2-BEC6-427B-B734-F9C75ED94A80}\".
Delete the registry value "AppPath" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8C338DDB-19FC-4C1F-B74D-6931EE55F7A1}\".
Delete the registry value "path" at "HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions\mphpbdjcljebbcnfopfngmfdackbbdgf\".
If DealPly uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).

Final Words:

If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.