What is SweetPacks Mahjong?
The Malwarebytes research team has determined that SweetPacks Mahjong is adware. These adware applications display advertisements not originating from the sites you are browsing.
How do I know if my computer is affected by SweetPacks Mahjong?
You may see these warnings during install:
this entry in your list of installed programs:
and these icons on your desktop and in your taskbar:
How did SweetPacks Mahjong get on my computer?
Adware applications use different methods for distributing themselves. This particular one was offered as a game.
How do I remove SweetPacks Mahjong?
Our program Malwarebytes Anti-Malware can detect and remove this potentially unwanted program.
- Please download Malwarebytes Anti-Malware to your desktop.
- Double-click mbam-setup-version.exe and follow the prompts to install the program.
- At the end, be sure a check-mark is placed next to the following:
- Enable free trial of Malwarebytes Anti-Malware Premium
- Launch Malwarebytes Anti-Malware
- Then click Finish.
- If an update is found, you will be prompted to download and install the latest version.
- Once the program has loaded, select Scan now. Or select the Threat Scan from the Scan menu.
- When the scan is complete , make sure that everything is set to "Quarantine", and click Apply Actions.
- Reboot your computer if prompted.
- No, Malwarebytes' Anti-Malware removes SweetPacks Mahjong completely.
- The shortcuts called Play Mahjong Mysteries of the Past, More FREE games, and Play Free Games on the desktop can be deleted if they belonged to the adware.
- You could be redirected to our Restore Browser page. You can read there how to fix additional browser redirect methods.
We hope our application and this guide have helped you eradicate this hijacker.
As you can see below the full version of Malwarebytes Anti-Malware would have protected you against the SweetPacks Mahjong adware. It would have warned you before the adware could install itself, giving you a chance to stop it before it became too late.
Technical details for experts
Possible signs in FRST logs:
() C:\Windows\System32\dmwu.exe (Exent Technologies Ltd.) C:\Program Files (x86)\Free Ride Games\GPlayer.exe HKU\S-1-5-19\...\Run: [Exetender] => C:\Program Files (x86)\Free Ride Games\GPlayer.exe [4932288 2016-03-24] (Exent Technologies Ltd.) HKU\S-1-5-20\...\Run: [Exetender] => C:\Program Files (x86)\Free Ride Games\GPlayer.exe [4932288 2016-03-24] (Exent Technologies Ltd.) HKCU\...\Run: [Exetender] => C:\Program Files (x86)\Free Ride Games\GPlayer.exe [4932288 2016-03-24] (Exent Technologies Ltd.) HKU\S-1-5-18\...\Run: [Exetender] => C:\Program Files (x86)\Free Ride Games\GPlayer.exe [4932288 2016-03-24] (Exent Technologies Ltd.) FF DefaultSearchEngine: SweetIM search FF DefaultSearchUrl: FF SelectedSearchEngine: SweetIM search FF Homepage: hxxp://home.sweetim.com/?crg=3.49010003&ptr=100&st=12&barid={8C2FBFC5-23D7-11E6-9FA8-08002796C23D} FF Keyword.URL: hxxp://search.sweetim.com/search.asp?src=2&ptr=100&barid={8C2FBFC5-23D7-11E6-9FA8-08002796C23D}&q= FF Plugin-x32: @exent.com/npExentCtl,version=7.0.0.0 -> C:\Program Files (x86)\Free Ride Games\npExentCtl.dll [2009-12-27] (Exent Technologies Ltd.) FF Plugin-x32: www.exent.com/GameTreatWidget -> C:\Program Files (x86)\Free Ride Games\NPGameTreatPlugin.dll [No File] FF SearchPlugin: C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\searchplugins\SweetIM Search.xml [2016-05-27] FF SearchPlugin: C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\searchplugins\sweetim.xml [2016-05-27] FF ExtraCheck: C:\Program Files (x86)\mozilla firefox\firefox.cfg [2016-05-27] <==== ATTENTION R2 IBUpdaterService; C:\Windows\system32\dmwu.exe [1277744 2013-05-16] () R2 X5XSEx_Pr143; C:\Program Files (x86)\Free Ride Games\X5XSEx_Pr143.Sys [56584 2013-07-18] (Exent Technologies Ltd.) U3 X5Ex_Pr143; C:\Program Files (x86)\Free Ride Games\X5Ex_Pr143.Sys [612104 2013-11-28] (Exent Technologies Ltd.) C:\Users\{username}\Desktop\Play Free Games.lnk C:\Users\{username}\Desktop\More FREE games.lnk C:\Users\{username}\Desktop\Play Mahjong Mysteries of the Past.lnk C:\Users\{username}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Free Ride Games C:\Program Files (x86)\Free Ride Games C:\Users\Public\Desktop\Play Free Games.lnk C:\ProgramData\Microsoft\Windows\Start Menu\Free Ride Games.lnk C:\Users\Public\Desktop\More FREE games.lnk C:\Windows\GPlrLanc.dat C:\ProgramData\Free Ride Games (Exent Technologies Ltd.) C:\Windows\ExentInfo.exe C:\Windows\SysWOW64\WNLT C:\Windows\SysWOW64\mjcm C:\Windows\SysWOW64\jmdp C:\Windows\SysWOW64\ARFC C:\Windows\system32\tprb C:\Program Files (x86)\sweetpacks bundle uninstaller C:\Windows\system32\dmwu.exe (IncrediMail, Ltd.) C:\Windows\system32\ImHttpComm.dll Free Ride Games Player (x32 Version: - Exent Technologies Ltd) Hidden Mahjong: Mysteries of the Past Bundle by SweetPacks (HKLM-x32\...\Mahjong: Mysteries of the Past Bundle by SweetPacks) (Version: 1.0.0.0 - SweetPacks LTD) <==== ATTENTION SweetPacks Updater (x32 Version: 4.0.1.0 - ) Hidden <==== ATTENTION ShortcutWithArgument: C:\Users\{username}\Desktop\Play Mahjong Mysteries of the Past.lnk -> C:\Remote Programs\Mahjong Mysteries of the Past\GPlrLanc.exe (Exent Technologies Ltd.) -> -LOpCode 1 -shortcut hxxp://www.freeridegames.com/main/shortcut.jsp?theme=Home&AppId=765950&RunIndex=1&PrvId=143&AcID=&OpenShInIE=0&PrvDir=Default ShortcutWithArgument: C:\Users\{username}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Free Ride Games\Mahjong Mysteries of the Past\Play Mahjong Mysteries of the Past.lnk -> C:\Remote Programs\Mahjong Mysteries of the Past\GPlrLanc.exe (Exent Technologies Ltd.) -> -LOpCode 1 -shortcut hxxp://www.freeridegames.com/main/shortcut.jsp?theme=Home&AppId=765950&RunIndex=1&PrvId=143&AcID=&OpenShInIE=0&PrvDir=Default FirewallRules: [{B37EBFE3-95F2-470D-AE54-C0AACC7AA370}] => (Allow) C:\Windows\System32\dmwu.exe FirewallRules: [{B1F8A31A-9FA7-4DD4-BDAC-B8129A942394}] => (Allow) C:\Windows\System32\dmwu.exe FirewallRules: [{2F336BDD-D0F6-410B-AB92-93C4D15A381F}] => (Allow) C:\Windows\SysWOW64\ARFC\wrtc.exe FirewallRules: [{F9D455C7-7A4D-4A5B-8CBB-7E7C63DD2997}] => (Allow) C:\Windows\SysWOW64\ARFC\wrtc.exeMalwarebytes Anti-Malware log:
Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 5/27/2016 Scan Time: 9:07 AM Logfile: mbamMahjongSweetIM.txt Administrator: Yes Version: 2.2.1.1043 Malware Database: v2016.05.27.02 Rootkit Database: v2016.05.20.01 License: Premium Malware Protection: Disabled Malicious Website Protection: Enabled Self-protection: Enabled OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {username} Scan Type: Threat Scan Result: Completed Objects Scanned: 312050 Time Elapsed: 8 min, 39 sec Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Enabled PUM: Enabled Processes: 1 Adware.InstallBrain, C:\Windows\System32\dmwu.exe, 3672, Delete-on-Reboot, [f4ea98429bfea294c214c09025de946c] Modules: 0 (No malicious items detected) Registry Keys: 6 PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WNLT, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], PUP.Optional.SweetIM, HKLM\SOFTWARE\WOW6432NODE\SweetIM, Quarantined, [4d9129b14c4da3933bb8dbc080837987], Adware.InstallBrain, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\IBUpdaterService, Quarantined, [f4ea98429bfea294c214c09025de946c], PUP.Optional.SweetIM, HKCU\SOFTWARE\SweetIM, Quarantined, [db0319c1dabf3303ae41d8c3b053ab55], PUP.Optional.InstallBrain, HKCU\SOFTWARE\WNLT, Quarantined, [cb1336a457427bbbe3a247440ef5847c], PUP.Optional.SweetPacks, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\Mahjong: Mysteries of the Past Bundle by SweetPacks, Quarantined, [a6389c3efe9ba393609a0c9857abf50b], Registry Values: 5 PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{B37EBFE3-95F2-470D-AE54-C0AACC7AA370}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Windows\System32\dmwu.exe|Name=dmwu|, Quarantined, [22bc15c52f6a62d478793f92ec17c937] PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{B1F8A31A-9FA7-4DD4-BDAC-B8129A942394}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Windows\System32\dmwu.exe|Name=dmwu|, Quarantined, [07d79743930669cdab46fad79f64ef11] PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{2F336BDD-D0F6-410B-AB92-93C4D15A381F}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Windows\SysWOW64\ARFC\wrtc.exe|Name=wrtc|, Quarantined, [31ad5486e4b5da5c6c84795843c0c23e] PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{F9D455C7-7A4D-4A5B-8CBB-7E7C63DD2997}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Windows\SysWOW64\ARFC\wrtc.exe|Name=wrtc|, Quarantined, [9e40c119cccd92a4727eebe614efb44c] PUP.Optional.InstallBrain, HKCU\SOFTWARE\WNLT|URL, SIM, Quarantined, [cb1336a457427bbbe3a247440ef5847c] Registry Data: 0 (No malicious items detected) Folders: 7 PUP.Optional.Perion, C:\Windows\SysWOW64\ARFC, Quarantined, [805e9347732651e58b4c3b7506fcd52b], PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\Installation, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\InstallationFiles, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\InstallationFiles\Injector, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp, Quarantined, [f7e7904a6b2e52e4c7250794fd06e917], PUP.Optional.SweetPacks, C:\Program Files (x86)\sweetpacks bundle uninstaller, Quarantined, [a6389c3efe9ba393609a0c9857abf50b], Files: 19 PUP.Optional.SweetIM, C:\Users\{username}\Desktop\MahJong.exe, Quarantined, [eaf4b02af3a640f6a90d590d1be95fa1], PUP.Optional.SweetIM, C:\Users\{username}\AppData\Local\Temp\mgsqlite3.7z, Quarantined, [de002fab0099aa8c3086e5816c9837c9], PUP.Optional.SweetIM, C:\Users\{username}\AppData\Local\Temp\mgsqlite3.dll, Quarantined, [dc024a90badf0e28eccaabbb03010000], PUP.Optional.SweetPacks, C:\Users\{username}\AppData\Local\Temp\SweetIESetup.exe.7z, Quarantined, [cb139c3ef9a01c1a19737875e51e12ee], PUP.Optional.SweetPacks, C:\Users\{username}\AppData\Local\Temp\SweetIMSetup.exe.7z, Quarantined, [c31ba3376b2e4fe7385421cc51b2cb35], PUP.Optional.Perion, C:\Users\{username}\AppData\Local\Temp\WSSetup.exe, Quarantined, [4599c01a8a0f0f27af35213b35cc6f91], PUP.Optional.Perion, C:\Windows\SysWOW64\ARFC\wrtc.exe, Quarantined, [805e9347732651e58b4c3b7506fcd52b], PUP.Optional.Perion, C:\Windows\SysWOW64\ARFC\msvcp100.dll, Quarantined, [805e9347732651e58b4c3b7506fcd52b], PUP.Optional.Perion, C:\Windows\SysWOW64\ARFC\msvcr100.dll, Quarantined, [805e9347732651e58b4c3b7506fcd52b], PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\Installation\uninstaller.exe, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\Installation\NTSetup.exe, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], PUP.Optional.Perion, C:\Windows\SysWOW64\WNLT\Installation\SKSetup.exe, Quarantined, [3f9f3aa040598da902d7337d6c963ac6], PUP.Optional.SweetIM, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\searchplugins\SweetIM Search.xml, Quarantined, [16c8776318813ef826c23962996a12ee], PUP.Optional.SweetIM, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\searchplugins\sweetim.xml, Quarantined, [a13dfedce7b26bcb1ace485326dd58a8], PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp\SweetNT.crx, Quarantined, [f7e7904a6b2e52e4c7250794fd06e917], Adware.InstallBrain, C:\Windows\System32\dmwu.exe, Delete-on-Reboot, [f4ea98429bfea294c214c09025de946c], PUP.Optional.SweetPacks, C:\Program Files (x86)\sweetpacks bundle uninstaller\uninstaller.exe, Quarantined, [a6389c3efe9ba393609a0c9857abf50b], PUP.Optional.SweetIM, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\prefs.js, Good: (), Bad: (user_pref("keyword.URL", "http://search.sweetim.com/search.asp?src=2&ptr=100&barid={8C2FBFC5-23D7-11E6-9FA8-08002796C23D}&q=");), Replaced,[934bac2ea8f1b5813ec3284c719317e9] PUP.Optional.SweetIM, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\prefs.js, Good: (user_pref("browser.startup.homepage", "https://www.malwarebytes.org/restorebrowser/), Bad: (user_pref("browser.startup.homepage", "http://home.sweetim.com), Replaced,[16c837a3d9c0a591f11b9ae06e962fd1] Physical Sectors: 0 (No malicious items detected) (end)As mentioned before the full version of Malwarebytes Anti-Malware could have protected your computer against this threat.
We use different ways of protecting your computer(s):
- Dynamically Blocks Malware Sites & Servers
- Malware Execution Prevention