Jump to content

Removal instructions for SweetPacks Mahjong


Recommended Posts

  • Staff
What is SweetPacks Mahjong?

The Malwarebytes research team has determined that SweetPacks Mahjong is adware. These adware applications display advertisements not originating from the sites you are browsing.

How do I know if my computer is affected by SweetPacks Mahjong?

You may see these warnings during install:

main.png

warning1.png

warning2.png

warning3.png

warning5.png

warning6.png

this entry in your list of installed programs:

warning4.png

and these icons on your desktop and in your taskbar:

icons.png

How did SweetPacks Mahjong get on my computer?

Adware applications use different methods for distributing themselves. This particular one was offered as a game.

How do I remove SweetPacks Mahjong?

Our program Malwarebytes Anti-Malware can detect and remove this potentially unwanted program.
  • Please download Malwarebytes Anti-Malware to your desktop.
  • Double-click mbam-setup-version.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to the following:
    • Enable free trial of Malwarebytes Anti-Malware Premium
    • Launch Malwarebytes Anti-Malware
  • Then click Finish.
  • If an update is found, you will be prompted to download and install the latest version.
  • Once the program has loaded, select Scan now. Or select the Threat Scan from the Scan menu.
  • When the scan is complete , make sure that everything is set to "Quarantine", and click Apply Actions.
  • Reboot your computer if prompted.
Is there anything else I need to do to get rid of SweetPacks Mahjong?
  • No, Malwarebytes' Anti-Malware removes SweetPacks Mahjong completely.
  • The shortcuts called Play Mahjong Mysteries of the Past, More FREE games, and Play Free Games on the desktop can be deleted if they belonged to the adware.
  • You could be redirected to our Restore Browser page. You can read there how to fix additional browser redirect methods.
How would the full version of Malwarebytes Anti-Malware help protect me?

We hope our application and this guide have helped you eradicate this hijacker.

As you can see below the full version of Malwarebytes Anti-Malware would have protected you against the SweetPacks Mahjong adware. It would have warned you before the adware could install itself, giving you a chance to stop it before it became too late.

 

protection1.png


Technical details for experts

Possible signs in FRST logs:
 
 () C:\Windows\System32\dmwu.exe
 (Exent Technologies Ltd.) C:\Program Files (x86)\Free Ride Games\GPlayer.exe
 HKU\S-1-5-19\...\Run: [Exetender] => C:\Program Files (x86)\Free Ride Games\GPlayer.exe [4932288 2016-03-24] (Exent Technologies Ltd.)
 HKU\S-1-5-20\...\Run: [Exetender] => C:\Program Files (x86)\Free Ride Games\GPlayer.exe [4932288 2016-03-24] (Exent Technologies Ltd.)
 HKCU\...\Run: [Exetender] => C:\Program Files (x86)\Free Ride Games\GPlayer.exe [4932288 2016-03-24] (Exent Technologies Ltd.)
 HKU\S-1-5-18\...\Run: [Exetender] => C:\Program Files (x86)\Free Ride Games\GPlayer.exe [4932288 2016-03-24] (Exent Technologies Ltd.)
 FF DefaultSearchEngine: SweetIM search
 FF DefaultSearchUrl: 
 FF SelectedSearchEngine: SweetIM search
 FF Homepage: hxxp://home.sweetim.com/?crg=3.49010003&ptr=100&st=12&barid={8C2FBFC5-23D7-11E6-9FA8-08002796C23D}
 FF Keyword.URL: hxxp://search.sweetim.com/search.asp?src=2&ptr=100&barid={8C2FBFC5-23D7-11E6-9FA8-08002796C23D}&q=
 FF Plugin-x32: @exent.com/npExentCtl,version=7.0.0.0 -> C:\Program Files (x86)\Free Ride Games\npExentCtl.dll [2009-12-27] (Exent Technologies Ltd.)
 FF Plugin-x32: www.exent.com/GameTreatWidget -> C:\Program Files (x86)\Free Ride Games\NPGameTreatPlugin.dll [No File]
 FF SearchPlugin: C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\searchplugins\SweetIM Search.xml [2016-05-27]
 FF SearchPlugin: C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\searchplugins\sweetim.xml [2016-05-27]
 FF ExtraCheck: C:\Program Files (x86)\mozilla firefox\firefox.cfg [2016-05-27] <==== ATTENTION
 R2 IBUpdaterService; C:\Windows\system32\dmwu.exe [1277744 2013-05-16] ()
 R2 X5XSEx_Pr143; C:\Program Files (x86)\Free Ride Games\X5XSEx_Pr143.Sys [56584 2013-07-18] (Exent Technologies Ltd.)
 U3 X5Ex_Pr143; C:\Program Files (x86)\Free Ride Games\X5Ex_Pr143.Sys [612104 2013-11-28] (Exent Technologies Ltd.)
 C:\Users\{username}\Desktop\Play Free Games.lnk
 C:\Users\{username}\Desktop\More FREE games.lnk
 C:\Users\{username}\Desktop\Play Mahjong Mysteries of the Past.lnk
 C:\Users\{username}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Free Ride Games
 C:\Program Files (x86)\Free Ride Games
 C:\Users\Public\Desktop\Play Free Games.lnk
 C:\ProgramData\Microsoft\Windows\Start Menu\Free Ride Games.lnk
 C:\Users\Public\Desktop\More FREE games.lnk
 C:\Windows\GPlrLanc.dat
 C:\ProgramData\Free Ride Games
 (Exent Technologies Ltd.) C:\Windows\ExentInfo.exe
 C:\Windows\SysWOW64\WNLT
 C:\Windows\SysWOW64\mjcm
 C:\Windows\SysWOW64\jmdp
 C:\Windows\SysWOW64\ARFC
 C:\Windows\system32\tprb
 C:\Program Files (x86)\sweetpacks bundle uninstaller
 C:\Windows\system32\dmwu.exe
 (IncrediMail, Ltd.) C:\Windows\system32\ImHttpComm.dll

Free Ride Games Player (x32 Version:  - Exent Technologies Ltd) Hidden
Mahjong: Mysteries of the Past Bundle by SweetPacks (HKLM-x32\...\Mahjong: Mysteries of the Past Bundle by SweetPacks) (Version: 1.0.0.0 - SweetPacks LTD) <==== ATTENTION
SweetPacks Updater (x32 Version: 4.0.1.0 - ) Hidden <==== ATTENTION
ShortcutWithArgument: C:\Users\{username}\Desktop\Play Mahjong Mysteries of the Past.lnk -> C:\Remote Programs\Mahjong Mysteries of the Past\GPlrLanc.exe (Exent Technologies Ltd.) -> -LOpCode 1 -shortcut hxxp://www.freeridegames.com/main/shortcut.jsp?theme=Home&AppId=765950&RunIndex=1&PrvId=143&AcID=&OpenShInIE=0&PrvDir=Default
ShortcutWithArgument: C:\Users\{username}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Free Ride Games\Mahjong Mysteries of the Past\Play Mahjong Mysteries of the Past.lnk -> C:\Remote Programs\Mahjong Mysteries of the Past\GPlrLanc.exe (Exent Technologies Ltd.) -> -LOpCode 1 -shortcut hxxp://www.freeridegames.com/main/shortcut.jsp?theme=Home&AppId=765950&RunIndex=1&PrvId=143&AcID=&OpenShInIE=0&PrvDir=Default
FirewallRules: [{B37EBFE3-95F2-470D-AE54-C0AACC7AA370}] => (Allow) C:\Windows\System32\dmwu.exe
FirewallRules: [{B1F8A31A-9FA7-4DD4-BDAC-B8129A942394}] => (Allow) C:\Windows\System32\dmwu.exe
FirewallRules: [{2F336BDD-D0F6-410B-AB92-93C4D15A381F}] => (Allow) C:\Windows\SysWOW64\ARFC\wrtc.exe
FirewallRules: [{F9D455C7-7A4D-4A5B-8CBB-7E7C63DD2997}] => (Allow) C:\Windows\SysWOW64\ARFC\wrtc.exe
Malwarebytes Anti-Malware log:
Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 5/27/2016
Scan Time: 9:07 AM
Logfile: mbamMahjongSweetIM.txt
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.05.27.02
Rootkit Database: v2016.05.20.01
License: Premium
Malware Protection: Disabled
Malicious Website Protection: Enabled
Self-protection: Enabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: {username}

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 312050
Time Elapsed: 8 min, 39 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 1
Adware.InstallBrain, C:\Windows\System32\dmwu.exe, 3672, Delete-on-Reboot, [f4ea98429bfea294c214c09025de946c]

Modules: 0
(No malicious items detected)

Registry Keys: 6
PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WNLT, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], 
PUP.Optional.SweetIM, HKLM\SOFTWARE\WOW6432NODE\SweetIM, Quarantined, [4d9129b14c4da3933bb8dbc080837987], 
Adware.InstallBrain, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\IBUpdaterService, Quarantined, [f4ea98429bfea294c214c09025de946c], 
PUP.Optional.SweetIM, HKCU\SOFTWARE\SweetIM, Quarantined, [db0319c1dabf3303ae41d8c3b053ab55], 
PUP.Optional.InstallBrain, HKCU\SOFTWARE\WNLT, Quarantined, [cb1336a457427bbbe3a247440ef5847c], 
PUP.Optional.SweetPacks, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\Mahjong: Mysteries of the Past Bundle by SweetPacks, Quarantined, [a6389c3efe9ba393609a0c9857abf50b], 

Registry Values: 5
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{B37EBFE3-95F2-470D-AE54-C0AACC7AA370}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Windows\System32\dmwu.exe|Name=dmwu|, Quarantined, [22bc15c52f6a62d478793f92ec17c937]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{B1F8A31A-9FA7-4DD4-BDAC-B8129A942394}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Windows\System32\dmwu.exe|Name=dmwu|, Quarantined, [07d79743930669cdab46fad79f64ef11]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{2F336BDD-D0F6-410B-AB92-93C4D15A381F}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Windows\SysWOW64\ARFC\wrtc.exe|Name=wrtc|, Quarantined, [31ad5486e4b5da5c6c84795843c0c23e]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{F9D455C7-7A4D-4A5B-8CBB-7E7C63DD2997}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Windows\SysWOW64\ARFC\wrtc.exe|Name=wrtc|, Quarantined, [9e40c119cccd92a4727eebe614efb44c]
PUP.Optional.InstallBrain, HKCU\SOFTWARE\WNLT|URL, SIM, Quarantined, [cb1336a457427bbbe3a247440ef5847c]

Registry Data: 0
(No malicious items detected)

Folders: 7
PUP.Optional.Perion, C:\Windows\SysWOW64\ARFC, Quarantined, [805e9347732651e58b4c3b7506fcd52b], 
PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\Installation, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], 
PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], 
PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\InstallationFiles, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], 
PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\InstallationFiles\Injector, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], 
PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp, Quarantined, [f7e7904a6b2e52e4c7250794fd06e917], 
PUP.Optional.SweetPacks, C:\Program Files (x86)\sweetpacks bundle uninstaller, Quarantined, [a6389c3efe9ba393609a0c9857abf50b], 

Files: 19
PUP.Optional.SweetIM, C:\Users\{username}\Desktop\MahJong.exe, Quarantined, [eaf4b02af3a640f6a90d590d1be95fa1], 
PUP.Optional.SweetIM, C:\Users\{username}\AppData\Local\Temp\mgsqlite3.7z, Quarantined, [de002fab0099aa8c3086e5816c9837c9], 
PUP.Optional.SweetIM, C:\Users\{username}\AppData\Local\Temp\mgsqlite3.dll, Quarantined, [dc024a90badf0e28eccaabbb03010000], 
PUP.Optional.SweetPacks, C:\Users\{username}\AppData\Local\Temp\SweetIESetup.exe.7z, Quarantined, [cb139c3ef9a01c1a19737875e51e12ee], 
PUP.Optional.SweetPacks, C:\Users\{username}\AppData\Local\Temp\SweetIMSetup.exe.7z, Quarantined, [c31ba3376b2e4fe7385421cc51b2cb35], 
PUP.Optional.Perion, C:\Users\{username}\AppData\Local\Temp\WSSetup.exe, Quarantined, [4599c01a8a0f0f27af35213b35cc6f91], 
PUP.Optional.Perion, C:\Windows\SysWOW64\ARFC\wrtc.exe, Quarantined, [805e9347732651e58b4c3b7506fcd52b], 
PUP.Optional.Perion, C:\Windows\SysWOW64\ARFC\msvcp100.dll, Quarantined, [805e9347732651e58b4c3b7506fcd52b], 
PUP.Optional.Perion, C:\Windows\SysWOW64\ARFC\msvcr100.dll, Quarantined, [805e9347732651e58b4c3b7506fcd52b], 
PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\Installation\uninstaller.exe, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], 
PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\Installation\NTSetup.exe, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], 
PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\Installation\SKSetup.exe, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], 
PUP.Optional.SweetIM, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\searchplugins\SweetIM Search.xml, Quarantined, [16c8776318813ef826c23962996a12ee], 
PUP.Optional.SweetIM, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\searchplugins\sweetim.xml, Quarantined, [a13dfedce7b26bcb1ace485326dd58a8], 
PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp\SweetNT.crx, Quarantined, [f7e7904a6b2e52e4c7250794fd06e917], 
Adware.InstallBrain, C:\Windows\System32\dmwu.exe, Delete-on-Reboot, [f4ea98429bfea294c214c09025de946c], 
PUP.Optional.SweetPacks, C:\Program Files (x86)\sweetpacks bundle uninstaller\uninstaller.exe, Quarantined, [a6389c3efe9ba393609a0c9857abf50b], 
PUP.Optional.SweetIM, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\prefs.js, Good: (), Bad: (user_pref("keyword.URL", "http://search.sweetim.com/search.asp?src=2&ptr=100&barid={8C2FBFC5-23D7-11E6-9FA8-08002796C23D}&q=");), Replaced,[934bac2ea8f1b5813ec3284c719317e9]
PUP.Optional.SweetIM, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\prefs.js, Good: (user_pref("browser.startup.homepage", "https://www.malwarebytes.org/restorebrowser/), Bad: (user_pref("browser.startup.homepage", "http://home.sweetim.com), Replaced,[16c837a3d9c0a591f11b9ae06e962fd1]

Physical Sectors: 0
(No malicious items detected)


(end)
As mentioned before the full version of Malwarebytes Anti-Malware could have protected your computer against this threat.
We use different ways of protecting your computer(s):
  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention
Save yourself the hassle and get protected.
Link to post
Share on other sites

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.