Jump to content
Sign in to follow this  
Metallica

Removal instructions for 9o0gle

Recommended Posts

What is 9o0gle?

The Malwarebytes research team has determined that 9o0gle is a browser hijacker. These so-called "hijackers" manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice.

How do I know if my computer is affected by 9o0gle?

You may see this new startpage:

startpageswd.png

How did 9o0gle get on my computer?

Browser hijackers use different methods for distributing themselves. This particular one was bundled with other software.

How do I remove 9o0gle?

Our program Malwarebytes Anti-Malware can detect and remove this potentially unwanted program.
  • Please download Malwarebytes Anti-Malware to your desktop.
  • Double-click mbam-setup-{version}.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to:
    Launch Malwarebytes Anti-Malware
  • Then click Finish.
  • Once the program has loaded, select Scan Now. Or select the Threat Scan from the Scan menu.
  • If an update is available, it will be implemented before the rest of the scanning procedure.
  • When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  • Restart your computer when prompted to do so.
Is there anything else I need to do to get rid of 9o0gle?
  • No, Malwarebytes' Anti-Malware removes 9o0gle completely.
How would the full version of Malwarebytes Anti-Malware help protect me?

We hope our application and this guide have helped you eradicate this hijacker.

As you can see below the full version of Malwarebytes Anti-Malware would have protected you against the 9o0gle hijacker. It would have warned you before the application could install itself, giving you a chance to stop it before it became too late.

 

protection1.png


and it would have blocked some of the connections it tries to make:
 

protection2.png


Technical details for experts

Possible signs in FRST logs:

 
 C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk
Alterations made by the installer:
 
File system details [View: All details] (Selection)
---------------------------------------------------
    Adds the folder C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk
       Adds the file close_white.png"="6/9/2016 8:56 PM, 176 bytes, A
       Adds the file content_script - ¸±±¾.js"="6/29/2016 5:22 PM, 914 bytes, A
       Adds the file content_script.js"="7/6/2016 1:13 PM, 382 bytes, A
       Adds the file icon.png"="7/1/2016 5:35 PM, 106092 bytes, A
       Adds the file jquery.js"="1/26/2015 11:59 PM, 96381 bytes, A
       Adds the file jquery-1.8.3.min.js"="6/1/2016 11:34 PM, 93583 bytes, A
       Adds the file manifest.json"="7/1/2016 5:35 PM, 1615 bytes, A
       Adds the file popup.html"="7/1/2016 5:35 PM, 394 bytes, A
       Adds the file popup.js"="6/2/2016 10:58 AM, 56 bytes, A
Malwarebytes Anti-Malware log:
 
Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 9/30/2016
Scan Time: 12:20 PM
Logfile: mbam9o0gle.txt
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.09.30.06
Rootkit Database: v2016.09.26.02
License: Premium
Malware Protection: Disabled
Malicious Website Protection: Enabled
Self-protection: Enabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: {username}

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 322363
Time Elapsed: 9 min, 3 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 1
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk, Quarantined, [79d53c3c524893a3417cc33683818b75], 

Files: 12
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\Desktop\9o0gle.exe, Quarantined, [67e76315ebaf48eef9c539c0b45033cd], 
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk\close_white.png, Quarantined, [79d53c3c524893a3417cc33683818b75], 
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk\content_script - ����.js, Quarantined, [79d53c3c524893a3417cc33683818b75], 
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk\content_script.js, Quarantined, [79d53c3c524893a3417cc33683818b75], 
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk\icon.png, Quarantined, [79d53c3c524893a3417cc33683818b75], 
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk\jquery-1.8.3.min.js, Quarantined, [79d53c3c524893a3417cc33683818b75], 
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk\jquery.js, Quarantined, [79d53c3c524893a3417cc33683818b75], 
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk\manifest.json, Quarantined, [79d53c3c524893a3417cc33683818b75], 
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk\popup.html, Quarantined, [79d53c3c524893a3417cc33683818b75], 
PUP.Optional.Elex.ClnShrt, C:\Users\{username}\AppData\Local\kemgadeojglibflomicgnfeopkdfflnk\popup.js, Quarantined, [79d53c3c524893a3417cc33683818b75], 
PUP.Optional.WMIHijacker.ClnShrt, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\sessionstore-backups\recovery.js, Good: (), Bad: (9o0gle), Replaced,[f95566126f2bd46233c45f9ba163d927]
PUP.Optional.WMIHijacker.ClnShrt, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\{profile}.default\sessionstore.js, Good: (), Bad: (9o0gle.com), Replaced,[e06e1e5a61393402c92bef0bb351639d]

Physical Sectors: 0
(No malicious items detected)


(end)
As mentioned before the full version of Malwarebytes Anti-Malware could have protected your computer against this threat.
We use different ways of protecting your computer(s):
  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention
Save yourself the hassle and get protected.
Edited by Metallica

Share this post


Link to post
Share on other sites
Sign in to follow this  

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.