Jump to content
Sign in to follow this  
Metallica

Removal instructions for Shopperz

Recommended Posts

What is Shopperz?

The Malwarebytes research team has determined that Shopperz is a browser hijacker. These so-called "hijackers" manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements and acts as a LSP-hijacker.

How do I know if my computer is affected by Shopperz?

You may see this entry in your list of installed software:

warning4.png

this Scheduled Task:

warning3.png

and these browser add-ons:

warning1.png

warning2.png

How did Shopperz get on my computer?

Browser hijackers use different methods for distributing themselves. This particular one was bundled with other software.

How do I remove Shopperz?

Our program Malwarebytes Anti-Malware can detect and remove this potentially unwanted program.

  • Please download Malwarebytes Anti-Malware to your desktop.
  • Double-click mbam-setup-version.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to the following:
    • Enable free trial of Malwarebytes Anti-Malware Premium
    • Launch Malwarebytes Anti-Malware
  • Then click Finish.
  • If an update is found, you will be prompted to download and install the latest version.
  • Once the program has loaded, click on Settings > Detection and Protection and put a checkmark before Scan for Rootkits.
  • Then select Scan Now. Or select the Threat Scan from the Scan menu.
  • When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  • Restart your computer when prompted to do so.
Is there anything else I need to do to get rid of Shopperz?
  • You may be prompted twice to reboot after removal. Malwarebytes Anti-Malware needs to restore your connection after removing this LSP-hijacker.

    2reboot.png

  • If MBAM was unable to restore your dnsapi.dll files, you may also have to run Windows System File Checker to undo some of the changes done by this PUP. You can find more information about this hijacker in this blogpost.
  • This PUP creates some scheduled tasks. You can read here how to check for and, if necessary, remove Scheduled Tasks.
How would the full version of Malwarebytes Anti-Malware help protect me?

We hope our application and this guide have helped you eradicate this hijacker.

As you can see below the full version of Malwarebytes Anti-Malware would have protected you against the Shopperz hijacker. It would have warned you before the application could install itself, giving you a chance to stop it before it became too late.

protection1.png

Technical details for experts

Signs in a HijackThis log:

O2 - BHO: shopperz12082015 Helper - {3ea54411-9f2a-4a18-a93a-84312350f7c1} - C:\Program Files\shopperz12082015\Meieiwb.dllO4 - HKLM\..\RunOnce: [cmdrun] cmd.exe /C ipconfig /flushdnsO10 - Unknown file in Winsock LSP: c:\windows\system32\uiviuuj.dllO10 - Unknown file in Winsock LSP: c:\windows\system32\uiviuuj.dllO10 - Unknown file in Winsock LSP: c:\windows\system32\uiviuuj.dllO10 - Unknown file in Winsock LSP: c:\windows\system32\uiviuuj.dllO10 - Unknown file in Winsock LSP: c:\windows\system32\uiviuuj.dllO23 - Service: csrcc - Unknown owner - C:\Program Files\shopperz12082015\csrcc.exeO23 - Service: ElejooLyunp - Unknown owner - C:\Program Files\shopperz12082015\LuacRouct.exeO23 - Service: fb34c88a-8ad6-4355-a5df-7f6d006d9cdb - Unknown owner - C:\Program Files\shopperz12082015\Kfcurobg.exeO23 - Service: shopperz12082015 Updater - Unknown owner - C:\Program Files\shopperz12082015\Ideie.exeO23 - Service: Uiviuuj - Unknown owner - C:\Program Files\shopperz12082015\Uiviuuj.exe
Note that most of the file and other names in these logs are random.

Possible signs in FRST logs:

 

 () C:\Program Files\shopperz12082015\csrcc.exe () C:\Program Files\shopperz12082015\Kfcurobg.exe () C:\Program Files\shopperz12082015\Ideie.exe () C:\Program Files\shopperz12082015\Tuejet.exe () C:\Program Files\shopperz12082015\Tuejet64.exe () C:\Program Files\shopperz12082015\Uiviuuj.EXE () C:\Program Files\shopperz12082015\LuacRouct.exe HKLM\...\Run: [shopperz12082015] => C:\Program Files\shopperz12082015\Tuejet.exe [433528 2015-08-12] () HKLM\...\Run: [shopperz1208201564] => C:\Program Files\shopperz12082015\Tuejet64.exe [464760 2015-08-12] () HKLM-x32\...\RunOnce: [cmdrun] => cmd.exe /C ipconfig /flushdns BHO: shopperz12082015 -> {3ea54411-9f2a-4a18-a93a-84312350f7c1} -> C:\Program Files\shopperz12082015\Meieiwb64.dll [2015-08-12] () BHO-x32: shopperz12082015 -> {3ea54411-9f2a-4a18-a93a-84312350f7c1} -> C:\Program Files\shopperz12082015\Meieiwb.dll [2015-08-12] () Winsock: Catalog9 01 C:\Windows\SysWOW64\Uiviuuj.dll [283464 2015-08-28] () Winsock: Catalog9 02 C:\Windows\SysWOW64\Uiviuuj.dll [283464 2015-08-28] () Winsock: Catalog9 03 C:\Windows\SysWOW64\Uiviuuj.dll [283464 2015-08-28] () Winsock: Catalog9 04 C:\Windows\SysWOW64\Uiviuuj.dll [283464 2015-08-28] () Winsock: Catalog9 15 C:\Windows\SysWOW64\Uiviuuj.dll [283464 2015-08-28] () Winsock: Catalog9-x64 01 C:\Windows\system32\Uiviuuj64.dll [353608 2015-08-28] () Winsock: Catalog9-x64 02 C:\Windows\system32\Uiviuuj64.dll [353608 2015-08-28] () Winsock: Catalog9-x64 03 C:\Windows\system32\Uiviuuj64.dll [353608 2015-08-28] () Winsock: Catalog9-x64 04 C:\Windows\system32\Uiviuuj64.dll [353608 2015-08-28] () Winsock: Catalog9-x64 15 C:\Windows\system32\Uiviuuj64.dll [353608 2015-08-28] () FF user.js: detected! => C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\6gehedt6.default\user.js [2015-08-28] FF HKLM\...\Firefox\Extensions: [{3ea54411-9f2a-4a18-a93a-84312350f7c1}] - C:\Program Files\shopperz12082015\Firefox FF Extension: shopperz12082015 - C:\Program Files\shopperz12082015\Firefox [2015-08-28] FF HKLM-x32\...\Firefox\Extensions: [{3ea54411-9f2a-4a18-a93a-84312350f7c1}] - C:\Program Files\shopperz12082015\Firefox R2 csrcc; C:\Program Files\shopperz12082015\csrcc.exe [1448824 2015-08-12] () R2 ElejooLyunp; C:\Program Files\shopperz12082015\LuacRouct.exe [171848 2015-08-12] () R2 fb34c88a-8ad6-4355-a5df-7f6d006d9cdb; C:\Program Files\shopperz12082015\Kfcurobg.exe [285560 2015-08-12] () R2 shopperz12082015 Updater; C:\Program Files\shopperz12082015\Ideie.exe [174968 2015-08-12] () R3 Uiviuuj; C:\Program Files\shopperz12082015\Uiviuuj.exe [2043720 2015-08-12] () () C:\Windows\system32\Drivers\bsdriver.sys C:\Program Files\shopperz12082015 C:\Windows\SysWOW64\Uiviuuj.ini C:\Windows\System32\Tasks\Jarmeee C:\Windows\SysWOW64\UiviuujOff.ini C:\Windows\system32\UiviuujOff.ini C:\Windows\system32\idhk C:\Windows\system32\Uiviuuj64.dll C:\Windows\SysWOW64\Uiviuuj.dll (Cherimoya Ltd) C:\Windows\system32\Drivers\cherimoya.sys C:\Users\{username}\AppData\Local\Temp\oprun14851.exe C:\Users\{username}\AppData\Local\Temp\oprun18734.exeshopperz12082015 2.0.0.475 (HKLM\...\{3ea54411-9f2a-4a18-a93a-84312350f7c1}_is1) (Version: 2.0.0.475 - shopperz) <==== ATTENTIONTask: {CE0B7831-923C-4A25-A250-0853A953361B} - System32\Tasks\Jarmeee => C:\Program Files\shopperz12082015\Hvnkaufcv.bat [2015-08-12] () <==== ATTENTION
Malwarebytes Anti-Malware log:

 

Malwarebytes Anti-Malwarewww.malwarebytes.orgScan Date: 8/28/2015Scan Time: 1:16 PMLogfile: mbamShopperz.txtAdministrator: YesVersion: 2.1.8.1057Malware Database: v2015.08.28.02Rootkit Database: v2015.08.16.01License: FreeMalware Protection: DisabledMalicious Website Protection: DisabledSelf-protection: DisabledOS: Windows 7 Service Pack 1CPU: x64File System: NTFSUser: {username}Scan Type: Threat ScanResult: CompletedObjects Scanned: 327664Time Elapsed: 3 min, 27 secMemory: EnabledStartup: EnabledFilesystem: EnabledArchives: EnabledRootkits: DisabledHeuristics: EnabledPUP: EnabledPUM: EnabledProcesses: 8PUP.Optional.Perion, C:\Program Files\shopperz12082015\csrcc.exe, 2892, Delete-on-Reboot, [4ee417f70586f73f54c3bf12679a8977]PUP.Optional.Perion, C:\Program Files\shopperz12082015\Kfcurobg.exe, 1528, Delete-on-Reboot, [c07212fc0d7e68ced547547d877af20e]PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Ideie.exe, 3904, Delete-on-Reboot, [63cf2be307841422fa12eaa8ba4b45bb]PUP.Optional.Perion, C:\Program Files\shopperz12082015\Tuejet.exe, 3888, Delete-on-Reboot, [d35f47c75338181ef526f5dc21e0ff01]PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Tuejet64.exe, 3316, Delete-on-Reboot, [b77bcc4297f40b2b3cd0266cfb0a8977]Adware.Agent, C:\Program Files\shopperz12082015\Uiviuuj.EXE, 1548, Delete-on-Reboot, [40f2c14d4a41ab8b99a7def34eb311ef]PUP.Optional.Komodia, C:\Program Files\shopperz12082015\LuacRouct.exe, 2936, Delete-on-Reboot, [c36f030b8902bb7b3970a823ee13ec14]PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Uiviuuj.EXE, 1548, Delete-on-Reboot, [76bc3bd3018ab48201c007b4f014926e]Modules: 11PUP.Optional.Perion, C:\Program Files\shopperz12082015\Yyoihge.dll, Delete-on-Reboot, [47eb907e2368a2948fb849889f6232ce], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Vocvo.dll, Delete-on-Reboot, [989a28e6a2e9bb7bd445f0e1f110e41c], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Uizoa.dll, Delete-on-Reboot, [53df749a503b94a2d93f10c17889d828], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Pjepmjl.dll, Delete-on-Reboot, [7bb7818d711a0d292a1b06cbc43d9e62], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\freebl3.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\libnspr4.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\libplc4.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\libplds4.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\nss3.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\nssutil3.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\smime3.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], Registry Keys: 122PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\TYPELIB\{14EF423E-3EE8-44AE-9337-07AC3F27B744}, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\INTERFACE\{A9582D7B-F24A-441D-9D26-450D58F3CD17}, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\INTERFACE\{EE0D8859-2ED4-4B0D-9812-16865B9AFD65}, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{A9582D7B-F24A-441D-9D26-450D58F3CD17}, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{EE0D8859-2ED4-4B0D-9812-16865B9AFD65}, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{A9582D7B-F24A-441D-9D26-450D58F3CD17}, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{EE0D8859-2ED4-4B0D-9812-16865B9AFD65}, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{14EF423E-3EE8-44AE-9337-07AC3F27B744}, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{14EF423E-3EE8-44AE-9337-07AC3F27B744}, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\csrcc, Quarantined, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\TYPELIB\{919ACA41-9F03-457F-AFE7-50642A7A1166}, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\INTERFACE\{8DF8C342-E568-49DC-8723-AB633F4C0F65}, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\INTERFACE\{CB7C1830-E6DA-49AA-A3E3-6B2EF21BB460}, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{8DF8C342-E568-49DC-8723-AB633F4C0F65}, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{CB7C1830-E6DA-49AA-A3E3-6B2EF21BB460}, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{8DF8C342-E568-49DC-8723-AB633F4C0F65}, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{CB7C1830-E6DA-49AA-A3E3-6B2EF21BB460}, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{919ACA41-9F03-457F-AFE7-50642A7A1166}, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{919ACA41-9F03-457F-AFE7-50642A7A1166}, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\fb34c88a-8ad6-4355-a5df-7f6d006d9cdb, Quarantined, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\shopperz12082015 Updater, Quarantined, [63cf2be307841422fa12eaa8ba4b45bb], Adware.Agent, HKLM\SOFTWARE\CLASSES\TYPELIB\{0F8CE12D-D179-41EB-847B-E9EBBA2FE25F}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\INTERFACE\{181CB734-9CA0-4AB0-8C1F-B483C71F3954}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\INTERFACE\{42BBBEB3-8E8A-4E0F-800D-02B7268F9E8A}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\INTERFACE\{7E344532-8435-4633-81F0-A2EB20761D2B}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\INTERFACE\{BD972B83-79D2-4AE6-8A9D-8D6693E11F31}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\INTERFACE\{CD0A01B4-71F7-4456-9260-59595F43E7EA}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\INTERFACE\{F811468B-A941-488C-944C-07CF652F9259}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{181CB734-9CA0-4AB0-8C1F-B483C71F3954}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{42BBBEB3-8E8A-4E0F-800D-02B7268F9E8A}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{7E344532-8435-4633-81F0-A2EB20761D2B}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{BD972B83-79D2-4AE6-8A9D-8D6693E11F31}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{CD0A01B4-71F7-4456-9260-59595F43E7EA}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{F811468B-A941-488C-944C-07CF652F9259}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{181CB734-9CA0-4AB0-8C1F-B483C71F3954}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{42BBBEB3-8E8A-4E0F-800D-02B7268F9E8A}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{7E344532-8435-4633-81F0-A2EB20761D2B}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{BD972B83-79D2-4AE6-8A9D-8D6693E11F31}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{CD0A01B4-71F7-4456-9260-59595F43E7EA}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{F811468B-A941-488C-944C-07CF652F9259}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{0F8CE12D-D179-41EB-847B-E9EBBA2FE25F}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{0F8CE12D-D179-41EB-847B-E9EBBA2FE25F}, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], Adware.Agent, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Uiviuuj, Quarantined, [40f2c14d4a41ab8b99a7def34eb311ef], PUP.Optional.Komodia, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ElejooLyunp, Quarantined, [c36f030b8902bb7b3970a823ee13ec14], PUP.Optional.Cherimoya.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\cherimoya, Quarantined, [ae84a46a4843a98d562a692847be44bc], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\CLSID\{3ea54411-9f2a-4a18-a93a-84312350f7c1}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{3ea54411-9f2a-4a18-a93a-84312350f7c1}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\INTERFACE\{E4C3E50F-5761-4BF8-95A0-939A819DF1C3}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{E4C3E50F-5761-4BF8-95A0-939A819DF1C3}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{E4C3E50F-5761-4BF8-95A0-939A819DF1C3}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\Extension.Elecbce.1, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\Extension.Elecbce, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Extension.Elecbce, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\Extension.Elecbce, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{3EA54411-9F2A-4A18-A93A-84312350F7C1}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{3EA54411-9F2A-4A18-A93A-84312350F7C1}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Extension.Elecbce.1, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\Extension.Elecbce.1, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{3EA54411-9F2A-4A18-A93A-84312350F7C1}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKU\S-1-5-21-1707720958-3452775987-2250322232-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{3EA54411-9F2A-4A18-A93A-84312350F7C1}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKU\S-1-5-21-1707720958-3452775987-2250322232-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{3EA54411-9F2A-4A18-A93A-84312350F7C1}, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, HKLM\SOFTWARE\CLASSES\CLSID\{3EA54411-9F2A-4A18-A93A-84312350F7C1}\INPROCSERVER32, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], Rootkit.Agent.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\cherimoya, Quarantined, [8aa843cb5239b87ebaa1fe362bd852ae], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\shopperz12082015, Quarantined, [221021ed6a211f1729867e3d8e76dd23], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.JiegWyfedoc, Quarantined, [88aa7995523975c17515e6d528dcb44c], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.JiegWyfedoc.1, Quarantined, [78baf11d315ad462e4a6f3c8877d4bb5], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.MusVamuva, Quarantined, [7fb364aa5239e5514b3f645712f28f71], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.MusVamuva.1, Quarantined, [d161997532597cbaf892e2d91ce8a55b], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.NhgErhnehvanl, Quarantined, [0929e529becd4de9dab0ffbc867e5ea2], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.NhgErhnehvanl.1, Quarantined, [43ef7a94d8b365d17812cfecf70dcf31], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.TemmUesegmhh, Quarantined, [dd55ae60d2b9a294d5b563589d67f10f], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.TemmUesegmhh.1, Quarantined, [f83aa06edbb061d5ee9c1ba0857f19e7], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.WetjAfoacrigka, Quarantined, [949e2ee05833d36331596f4c7391c739], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\UiviuujLib.WetjAfoacrigka.1, Quarantined, [2f0362ac692252e48cfef6c56d97c739], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\APPID\Meieiwb.DLL, Quarantined, [0d25749a7e0d092d0682596239cbe11f], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\APPID\Uiviuuj.EXE, Quarantined, [ed45ea2492f91d198405caf143c1c13f], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\Meieiwb.DLL, Quarantined, [81b140ce2a61f640fa8e3c7f4bb910f0], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\Uiviuuj.EXE, Quarantined, [b082c846e1aa51e5e4a5734805fff60a], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Jarmeee, Delete-on-Reboot, [ba789f6ff09b3cfa356784373fc5aa56], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\shopperz12082015, Quarantined, [b2809d715932fe38b1feb6053dc7a45c], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.JiegWyfedoc, Quarantined, [aa88c648a9e27db95c2e4c6f3aca01ff], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.JiegWyfedoc.1, Quarantined, [df53c34bb5d65fd7a8e27c3ffa0a0af6], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.MusVamuva, Quarantined, [112137d7d3b87cba8802d8e3a2622cd4], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.MusVamuva.1, Quarantined, [6ec45ab483084ee88703c2f9749020e0], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.NhgErhnehvanl, Quarantined, [0230020cbccffd3999f1a01b14f0f30d], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.NhgErhnehvanl.1, Quarantined, [aa88c648830879bd4941e1daf1132dd3], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.TemmUesegmhh, Quarantined, [dc563dd16f1c092d4a408b306b990cf4], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.TemmUesegmhh.1, Quarantined, [a78b808e3a5192a40387f5c6b84cd52b], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.WetjAfoacrigka, Quarantined, [4be714fa6625c472dab07f3c1aeaf10f], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\UiviuujLib.WetjAfoacrigka.1, Quarantined, [bf7350be2b60bc7af298308bdc28b34d], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\Meieiwb.DLL, Quarantined, [240ed7378a01b97df8902c8f3bc912ee], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\Uiviuuj.EXE, Quarantined, [191934da8506fc3ab0d9695248bc25db], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Uiviuuj, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\TYPELIB\{0F8CE12D-D179-41EB-847B-E9EBBA2FE25F}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\INTERFACE\{181CB734-9CA0-4AB0-8C1F-B483C71F3954}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\INTERFACE\{42BBBEB3-8E8A-4E0F-800D-02B7268F9E8A}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\INTERFACE\{7E344532-8435-4633-81F0-A2EB20761D2B}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\INTERFACE\{BD972B83-79D2-4AE6-8A9D-8D6693E11F31}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\INTERFACE\{CD0A01B4-71F7-4456-9260-59595F43E7EA}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\INTERFACE\{F811468B-A941-488C-944C-07CF652F9259}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{181CB734-9CA0-4AB0-8C1F-B483C71F3954}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{42BBBEB3-8E8A-4E0F-800D-02B7268F9E8A}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{7E344532-8435-4633-81F0-A2EB20761D2B}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{BD972B83-79D2-4AE6-8A9D-8D6693E11F31}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{CD0A01B4-71F7-4456-9260-59595F43E7EA}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{F811468B-A941-488C-944C-07CF652F9259}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{181CB734-9CA0-4AB0-8C1F-B483C71F3954}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{42BBBEB3-8E8A-4E0F-800D-02B7268F9E8A}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{7E344532-8435-4633-81F0-A2EB20761D2B}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{BD972B83-79D2-4AE6-8A9D-8D6693E11F31}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{CD0A01B4-71F7-4456-9260-59595F43E7EA}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{F811468B-A941-488C-944C-07CF652F9259}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{0F8CE12D-D179-41EB-847B-E9EBBA2FE25F}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{0F8CE12D-D179-41EB-847B-E9EBBA2FE25F}, Quarantined, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{98AD4C4E-92AB-47B9-A529-A437E2E545E0}, Quarantined, [aa88b25cf497cc6ac7c60dae34d0a759], PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{98AD4C4E-92AB-47B9-A529-A437E2E545E0}, Quarantined, [1d1553bbc7c4a294335aeccf3dc7dd23], PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{98AD4C4E-92AB-47B9-A529-A437E2E545E0}, Quarantined, [cb67c44afa91cd6917765d5ec53fee12], PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-1707720958-3452775987-2250322232-1000\SOFTWARE\{98AD4C4E-92AB-47B9-A529-A437E2E545E0}, Quarantined, [131fd63894f762d40d80d3e80afa36ca], PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{3ea54411-9f2a-4a18-a93a-84312350f7c1}_is1, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], Registry Values: 13PUP.Optional.Perion, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|shopperz12082015, C:\Program Files\shopperz12082015\Tuejet.exe, Quarantined, [d35f47c75338181ef526f5dc21e0ff01]PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|shopperz1208201564, C:\Program Files\shopperz12082015\Tuejet64.exe, Quarantined, [b77bcc4297f40b2b3cd0266cfb0a8977]PUP.Optional.Perion, HKLM\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|{3EA54411-9F2A-4A18-A93A-84312350F7C1}, C:\Program Files\shopperz12082015\Firefox, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3]PUP.Optional.Perion, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|{3EA54411-9F2A-4A18-A93A-84312350F7C1}, C:\Program Files\shopperz12082015\Firefox, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3]PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\csrcc|ImagePath, "C:\Program Files\shopperz12082015\csrcc.exe", Quarantined, [6dc5a9651d6e4de93f7875467490b749]PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ElejooLyunp|ImagePath, "C:\Program Files\shopperz12082015\LuacRouct.exe" -cmd, Quarantined, [49e94ec0503bc472edcaceed1de7936d]PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\fb34c88a-8ad6-4355-a5df-7f6d006d9cdb|ImagePath, "C:\Program Files\shopperz12082015\Kfcurobg.exe", Quarantined, [6ac8d13d1279b28414a3e0db27dd956b]PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\shopperz12082015 Updater|ImagePath, C:\Program Files\shopperz12082015\Ideie.exe, Quarantined, [1b1769a5d2b943f3f2c5eecdd23232ce]PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Uiviuuj|ImagePath, C:\Program Files\shopperz12082015\Uiviuuj.exe, Quarantined, [062cca44eaa183b3ebccd7e4cc38f709]PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{98ad4c4e-92ab-47b9-a529-a437e2e545e0}|Name, C:\Program Files\shopperz12082015\Tuejet.exe, Quarantined, [aa88b25cf497cc6ac7c60dae34d0a759]PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{98ad4c4e-92ab-47b9-a529-a437e2e545e0}|Name, C:\Program Files\shopperz12082015\Tuejet.exe, Quarantined, [1d1553bbc7c4a294335aeccf3dc7dd23]PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{98ad4c4e-92ab-47b9-a529-a437e2e545e0}|Name, C:\Program Files\shopperz12082015\Tuejet.exe, Quarantined, [cb67c44afa91cd6917765d5ec53fee12]PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-1707720958-3452775987-2250322232-1000\SOFTWARE\{98ad4c4e-92ab-47b9-a529-a437e2e545e0}|Name, C:\Program Files\shopperz12082015\Tuejet.exe, Quarantined, [131fd63894f762d40d80d3e80afa36ca]Registry Data: 0(No malicious items detected)Folders: 13PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\content, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\content\libraries, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\content\resources, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\locale, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\locale\en-US, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\skin, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\defaults, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\defaults\preferences, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\libraries, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\resources, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], Files: 86PUP.Optional.Perion, C:\Program Files\shopperz12082015\csrcc.exe, Delete-on-Reboot, [4ee417f70586f73f54c3bf12679a8977], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Kfcurobg.exe, Delete-on-Reboot, [c07212fc0d7e68ced547547d877af20e], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Ideie.exe, Delete-on-Reboot, [63cf2be307841422fa12eaa8ba4b45bb], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Tuejet.exe, Delete-on-Reboot, [d35f47c75338181ef526f5dc21e0ff01], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Yyoihge.dll, Delete-on-Reboot, [47eb907e2368a2948fb849889f6232ce], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Vocvo.dll, Delete-on-Reboot, [989a28e6a2e9bb7bd445f0e1f110e41c], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Uizoa.dll, Delete-on-Reboot, [53df749a503b94a2d93f10c17889d828], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Pjepmjl.dll, Delete-on-Reboot, [7bb7818d711a0d292a1b06cbc43d9e62], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Tuejet64.exe, Delete-on-Reboot, [b77bcc4297f40b2b3cd0266cfb0a8977], Adware.Agent, C:\Program Files\shopperz12082015\Uiviuuj.EXE, Delete-on-Reboot, [40f2c14d4a41ab8b99a7def34eb311ef], PUP.Optional.Komodia, C:\Program Files\shopperz12082015\LuacRouct.exe, Delete-on-Reboot, [c36f030b8902bb7b3970a823ee13ec14], PUP.Optional.Cherimoya.A, C:\Windows\System32\drivers\cherimoya.sys, Delete-on-Reboot, [ae84a46a4843a98d562a692847be44bc], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Meieiwb64.dll, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Meieiwb.dll, Quarantined, [35fdfe10711a1521cc49e2ef09f82dd3], PUP.Optional.Shopperz.BrwsrFlsh, C:\Users\{username}\Desktop\sprz[1].exe, Quarantined, [4de542cc0289b58109e3a5ea93727987], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Pjepmjl64.dll, Delete-on-Reboot, [2a0869a59af1290dfa4c745de51c03fd], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\BCWebLibrary.dll, Quarantined, [a58d30de206b092d87852f63d43152ae], PUP.Optional.Perion, C:\Program Files\shopperz12082015\dr_inst.exe, Quarantined, [4ae8f01eb8d3fd398eb34a879b66f808], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\gcpum.dll, Quarantined, [52e02ce21972bd7914f80d8538cdd12f], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\InnoCallback.dll, Quarantined, [8ca6b5591477eb4b76961181986d7c84], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\nfregdrv64.exe, Quarantined, [141ef618fd8ef93d9676514109fc837d], PUP.Optional.Komodia, C:\Program Files\shopperz12082015\rmvall.exe, Quarantined, [92a00c02355626106543e6e5010057a9], PUP.Optional.Komodia, C:\Program Files\shopperz12082015\solgolubua.exe, Quarantined, [0e24c549632886b04664d9f2fa0738c8], PUP.Optional.Komodia, C:\Program Files\shopperz12082015\solgolubua64.exe, Quarantined, [65cd6ca27d0e1026ecbf458671909f61], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Sourrgezo.dll, Quarantined, [a1919579503bf83e968425ac689938c8], PUP.Optional.Winsock.HijackBoot, C:\Program Files\shopperz12082015\Uiviuuj.dll, Quarantined, [4ae8db339eed7fb7614b5279966b36ca], PUP.Optional.Winsock.HijackBoot, C:\Program Files\shopperz12082015\Uiviuuj64.dll, Quarantined, [d75b4dc19bf039fdbeefca018a776a96], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Uizoa64.dll, Delete-on-Reboot, [74befb1326655dd9ea5969689b6652ae], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Vocvo64.dll, Delete-on-Reboot, [a88a0a04f59624122420428f5aa7c937], PUP.Optional.Perion, C:\Program Files\shopperz12082015\wrapper.exe, Quarantined, [ba7863abb2d9241299a9e7ea1ae719e7], PUP.Optional.Perion, C:\Program Files\shopperz12082015\Yyoihge64.dll, Delete-on-Reboot, [2b076aa4b6d57cba14346170f0111ee2], PUP.Optional.Winsock.HijackBoot, C:\Windows\System32\Uiviuuj64.dll, Delete-on-Reboot, [072b8688a7e4e74f75387853a160857b], PUP.Optional.Winsock.HijackBoot, C:\Windows\SysWOW64\Uiviuuj.dll, Delete-on-Reboot, [141edb334c3fb482a309488358a96799], Rootkit.Agent.A, C:\Windows\System32\drivers\bsdriver.sys, Delete-on-Reboot, [cf63d33bf299171fff5a1d6ca55c12ee], PUP.Optional.Komodia, C:\Users\{username}\AppData\Local\Temp\oprun14851.exe, Quarantined, [b77bc945216a75c12287f7d4fc05926e], Trojan.Agent, C:\Users\{username}\AppData\Local\Temp\oprun18734.exe, Quarantined, [ee4442cc682320166f3a9fac0df811ef], PUP.Optional.Shopperz.BrwsrFlsh, C:\Users\{username}\AppData\Local\Temp\is-5N1TR.tmp\gcpum.dll, Quarantined, [191943cb088379bd49c3533fc44124dc], PUP.Optional.Perion, C:\Users\{username}\AppData\Local\Temp\is-5N1TR.tmp\Sourrgezo.dll, Quarantined, [230f37d78308b482b862b61bab56b848], PUP.Optional.Shopperz.BrwsrFlsh, C:\Users\{username}\AppData\Local\Temp\is-IPIF5.tmp\gcpum.dll, Quarantined, [76bcdf2f0685bd79b557afe3a65f857b], PUP.Optional.Perion, C:\Users\{username}\AppData\Local\Temp\is-IPIF5.tmp\Sourrgezo.dll, Quarantined, [73bf8e807e0d42f4fd1d359c5fa231cf], PUP.Optional.Shopperz.BrwsrFlsh, C:\Users\{username}\AppData\Local\Temp\is-JHA5K.tmp\gcpum.dll, Quarantined, [c86aa5696d1ebe78d636c6cce4213dc3], PUP.Optional.Perion, C:\Users\{username}\AppData\Local\Temp\is-JHA5K.tmp\Sourrgezo.dll, Quarantined, [a78b6f9f0586270ff52530a1ce33e719], PUP.Optional.Winsock.HijackBoot, C:\Windows\SysWOW64\Uiviuuj.ini, Quarantined, [191953bba2e9db5b36a31509cc3753ad], PUP.Optional.Winsock.HijackBoot, C:\Windows\System32\UiviuujOff.ini, Quarantined, [a78b0fff3e4d54e239a226f8986bff01], PUP.Optional.Winsock.HijackBoot, C:\Windows\SysWOW64\UiviuujOff.ini, Quarantined, [6ac82be3731874c2dffca17dc34031cf], PUP.Optional.PastaLeads.A, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_nps.pastaleads.com_0.localstorage, Quarantined, [80b2da347714f5411f62ac809172d12f], PUP.Optional.PastaLeads.A, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_nps.pastaleads.com_0.localstorage-journal, Quarantined, [6dc513fb602b59ddc9b88aa2be45ec14], Rootkit.Agent.A, C:\Windows\System32\drivers\cherimoya.sys, Delete-on-Reboot, [8aa843cb5239b87ebaa1fe362bd852ae], Trojan.Agent, C:\Users\{username}\AppData\Local\Temp\oprun14851.exe, Quarantined, [3bf713fb64276acc0fcd447e27dc659b], PUP.Optional.ReMarkable.A, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.re-markable00.re-markable.net_0.localstorage, Quarantined, [c86a7995d9b25bdb26802e7461a3c937], PUP.Optional.ReMarkable.A, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.re-markable00.re-markable.net_0.localstorage-journal, Quarantined, [3ef476987516b581a006bee4689cc23e], PUP.Optional.Shopperz.BrwsrFlsh, C:\Windows\System32\Tasks\Jarmeee, Quarantined, [b37f1ef0ee9de15557219f1c05ffa25e], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Uiviuuj.EXE, Delete-on-Reboot, [76bc3bd3018ab48201c007b4f014926e], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\brwbl.bin, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\freebl3.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Hvnkaufcv.bat, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\libnspr4.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\libplc4.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\libplds4.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\nss3.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\nssckbi.dll, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\nssdbm3.dll, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\nssutil3.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\prc.exe, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\prdt.bin, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\smime3.dll, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\softokn3.dll, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\sqlite3.dll, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\ssl3.dll, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\tree.js, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\unins000.dat, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\unins000.exe, Delete-on-Reboot, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome.manifest, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\icon.png, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\install.rdf, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\{3ea54411-9f2a-4a18-a93a-84312350f7c1}.xpi, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\content\main.js, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\content\main.xul, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\content\libraries\DataExchangeScript.js, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\content\resources\LocalScript.js, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\locale\en-US\overlay.dtd, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\chrome\skin\overlay.css, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\Firefox\defaults\preferences\defaults.js, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\libraries\DataExchangeScript.js, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz12082015\resources\LocalScript.js, Quarantined, [0929f11d58330c2a4c8f36e73fc4bf41], PUP.Optional.HijackHosts.Gen, C:\Windows\System32\idhk\jec\ivot.dat, Quarantined, [5fd3947aafdc61d5fe962e6a39cc5ca4], Physical Sectors: 0(No malicious items detected)(end)
As mentioned before the full version of Malwarebytes Anti-Malware could have protected your computer against this threat.

We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention
Save yourself the hassle and get protected. Edited by Metallica
update

Share this post


Link to post
Share on other sites
Sign in to follow this  

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.