Trojan.Win32.Alureon_154ed6b88d

by malwarelabrobot on October 6th, 2015 in Malware Descriptions.

Trojan-Downloader.Win32.Genome.vkbi (Kaspersky), Trojan.Win32.Alureon.FD, Trojan.Win32.Swrort.3.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 154ed6b88dabdd9dfb8c112e202107ad
SHA1: 11d8971c74030fd32e2a9b5a3c88ecef17a2a45b
SHA256: 6bc0f6ca249eca74bd73542e13cc49e563b6d1996cb1ca51a54983b23b56cc2e
SSDeep: 1536:RoLDYsacy7mHMowHjXJ6/AVVTb1IlKVE0iAJ 4fUHDXduH:RoPyys5jXJ4WrIlq/ VDtuH
Size: 71600 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: Cinema PlusV28.09
Created at: 2009-12-06 00:50:35
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

nsv5.tmp:2012
dca-host.exe:1088
nsf8.tmp:928
schtasks.exe:1068
schtasks.exe:1880
ciff-3.2.0-12191.exe:3396
%original file name%.exe:580
nsaB.tmp:456
ConsumerInputUpdate.exe:1852
ConsumerInputUpdate.exe:1072
ConsumerInputUpdate.exe:164
ConsumerInputUpdate.exe:824
ConsumerInputUpdate.exe:372
ConsumerInputUpdate.exe:912
dca-monitoring.exe:2100
ciie-3.2.0-12413.exe:1560
cimt-3.2.1-1112.exe:308

The Trojan injects its code into the following process(es):
No processes have been created.

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process nsv5.tmp:2012 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp\UAC.dll (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsf8.tmp (26165 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp\nsis_plugin.dll (22931 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsaB.tmp (16088 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsf8.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp\nsis_plugin.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp\UAC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz6.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsaB.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp (0 bytes)

The process nsf8.tmp:928 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsfA.tmp\UAC.dll (18 bytes)
%Program Files%\Consumer Input\CIuninstall.exe (23268 bytes)
%Program Files%\Consumer Input\CIuninstall.ico (26 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsf9.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsfA.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsfA.tmp\UAC.dll (0 bytes)

The process ciff-3.2.0-12191.exe:3396 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp\nsis_plugin.dll (24778 bytes)
%Program Files%\Consumer Input\Firefox\uninstall.exe (23720 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp\System.dll (11 bytes)
%Program Files%\Consumer Input\Firefox\ciff-3.2.0-12191.xpi (13701 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp\UAC.dll (18 bytes)
%Program Files%\Consumer Input\Firefox\uninstall.ico (26 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp\nsis_plugin.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp\UAC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr1C.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp (0 bytes)

The process %original file name%.exe:580 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsz2.tmp (6040 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\0[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse4.tmp\inetc.dll (784 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (964 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse3.tmp (43 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@histats[1].txt (199 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsv5.tmp (117794 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nse4.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse3.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse4.tmp\inetc.dll (0 bytes)

The process nsaB.tmp:456 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateHelper.msi (45 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_en.dll (28 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_fr.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUTD.tmp (9606 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_de.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputCrashHandler.exe (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdate.exe (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psuser.dll (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdate.dll (1990 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es-419.dll (29 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_ja.dll (25 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_zh-CN.dll (22 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psmachine.dll (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateOnDemand.exe (60 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateBroker.exe (60 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateHelper.msi (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUTD.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_en.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_fr.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_de.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputCrashHandler.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdate.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psuser.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdate.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es-419.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_ja.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_zh-CN.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psmachine.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateOnDemand.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateBroker.exe (0 bytes)

The process ConsumerInputUpdate.exe:1852 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Consumer Input\Update\Download\{1138A907-2253-45D6-99C1-843A0AC58730}\0.0.0.0\ciie-3.2.0-12413.exe (41656 bytes)
%WinDir%\Temp\Cab19.tmp (50 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (50 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Program Files%\Consumer Input\Update\Install\{E8858BE5-C8E2-42D0-856A-1E1AC167BFA4}\cimt-3.2.1-1112.exe (15278 bytes)
%Program Files%\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0\ciff-3.2.0-12191.exe (10815 bytes)
%WinDir%\Temp\Tar1A.tmp (2712 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Program Files%\Consumer Input\Update\Download\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}\0.0.0.0\cimt-3.2.1-1112.exe (15278 bytes)
%WinDir%\Temp\Tar14.tmp (2712 bytes)
%WinDir%\Temp\Cab15.tmp (54 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Program Files%\Consumer Input\Update\Install\{ADDC1D41-A5C8-4D63-88D1-EEC74D21B769}\ciie-3.2.0-12413.exe (41656 bytes)
%WinDir%\Temp\Cab13.tmp (54 bytes)
%WinDir%\Temp\Tar16.tmp (2712 bytes)
%Program Files%\Consumer Input\Update\Install\{DE282511-3FBA-42AF-9FE1-88D68624AED7}\ciff-3.2.0-12191.exe (10815 bytes)

The Trojan deletes the following file(s):

%WinDir%\Temp\Cab19.tmp (0 bytes)
%Program Files%\Consumer Input\Update\Install (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\{BA3F2716-1397-4EF1-8580-9E2C0B75441E}-cimt-3.2.1-1112.exe (0 bytes)
%WinDir%\Temp\Tar1A.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\{AC680E62-7074-4CAD-9FC4-B5B25B9B5C11}-ciie-3.2.0-12413.exe (0 bytes)
%WinDir%\Temp\Tar14.tmp (0 bytes)
%WinDir%\Temp\Cab15.tmp (0 bytes)
%WinDir%\Temp\Cab13.tmp (0 bytes)
%WinDir%\Temp\Tar16.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\{6BA81B9F-2A7B-4624-ABB2-B3B51925AAE5}-ciff-3.2.0-12191.exe (0 bytes)

The process ConsumerInputUpdate.exe:164 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateHelper.msi (45 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_en.dll (28 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll (5873 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\C3E814D1CB223AFCD58214D14C3B7EAB (220 bytes)
%WinDir%\Tasks\ConsumerInputUpdateTaskMachineUA.job (952 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdate.exe (601 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_ja.dll (25 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\8BD11C4A2318EC8E5A82462092971DEA (477 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\40C68D5626484A90937F0752C8B950AB (533 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_zh-CN.dll (22 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\40C68D5626484A90937F0752C8B950AB (160 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe (60 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe (60 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es-419.dll (29 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\ECF3006D44DA211141391220EE5049F4 (140 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll (673 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputCrashHandler.exe (601 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\C3E814D1CB223AFCD58214D14C3B7EAB (341 bytes)
%WinDir%\Tasks\ConsumerInputUpdateTaskMachineCore.job (948 bytes)
%Program Files%\Consumer Input\Update\ConsumerInputUpdate.exe (601 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\ECF3006D44DA211141391220EE5049F4 (14 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\psuser.dll (673 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\8BD11C4A2318EC8E5A82462092971DEA (208 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_de.dll (31 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_fr.dll (31 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es.dll (31 bytes)

The process ConsumerInputUpdate.exe:824 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\Cab11.tmp (54 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar18.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CabF.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (50 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar12.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar10.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab17.tmp (50 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\Cab11.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CabF.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar18.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar12.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab17.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar10.tmp (0 bytes)

The process ciie-3.2.0-12413.exe:1560 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Consumer Input\InternetExplorer\dca-host.exe (27903 bytes)
%Program Files%\Consumer Input\InternetExplorer\dca.js (18506 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp\UAC.dll (18 bytes)
%Program Files%\Consumer Input\InternetExplorer\uninstall.log (844 bytes)
%Program Files%\Consumer Input\InternetExplorer\uninstall.ico (26 bytes)
%Program Files%\Consumer Input\InternetExplorer\dca-bho.dll (22734 bytes)
%Program Files%\Consumer Input\InternetExplorer\cookie-retriever.exe (4042 bytes)
%Program Files%\Consumer Input\InternetExplorer\mozjs185-1.0.dll (47540 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp\System.dll (11 bytes)
%Program Files%\Consumer Input\InternetExplorer\uninstall.exe (46579 bytes)
%Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll (19305 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp\nsis_plugin.dll (26100 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp\UAC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp\nsis_plugin.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsl1F.tmp (0 bytes)

The process cimt-3.2.1-1112.exe:308 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\ns25.tmp (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp (4 bytes)
%Program Files%\Consumer Input\Monitoring\cinm-host.exe (6524 bytes)
%Program Files%\Consumer Input\Monitoring\uninstall.exe (25018 bytes)
%Program Files%\Consumer Input\Monitoring\uninstall.ico (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\UAC.dll (18 bytes)
%Program Files%\Consumer Input\Monitoring\manifest.json (726 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\nsExec.dll (6 bytes)
%Program Files%\Consumer Input\Monitoring\cookie-retriever.exe (4066 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\ns24.tmp (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\nsis_plugin.dll (26100 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\KillProcDLL.dll (1568 bytes)
%Program Files%\Consumer Input\Monitoring\dca-monitoring.exe (25963 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Consumer Input Monitoring Tool_SID.dat (46 bytes)
%WinDir%\Tasks\CIMT_S-1-5-21-1844237615-1960408961-1801674531-1003.job (498 bytes)
%WinDir%\Tasks\CIMT_daily_S-1-5-21-1844237615-1960408961-1801674531-1003.job (464 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsc22.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\ns25.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\UAC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\nsExec.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\ns24.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\nsis_plugin.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\KillProcDLL.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Consumer Input Monitoring Tool_SID.dat (0 bytes)

Registry activity

The process nsv5.tmp:2012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\ConsumerInput\Common]
"InstallInfo" = "1{}"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Common]
"captureType" = "22"
"postinstallUrl" = "1"
"openPostInstallPage" = "0true"

[HKCU\Software\Compete\PartnerData]
"notifyPartner" = "0true"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\ConsumerInput\Common]
"Installed" = "2015.10.05 2:04:43"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"lang" = "en"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Common]
"supresspostinstall" = "0false"
"disableUninstallDlg" = "false"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"client" = "spruce000|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\CompeteInc]
"MachineID" = "{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

[HKLM\SOFTWARE\ConsumerInput\Common]
"UserSID" = "S-1-5-21-1844237615-1960408961-1801674531-1003"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\ConsumerInput\Common]
"panelid" = "1spruce000"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\ConsumerInput\Common]
"installCR" = "1"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"lang" = "en"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKCU\Software\Compete\PartnerData]
"partnerUrl" = "1http://www.moztweak.com/api/postback/?CID=1317&d=1"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"client" = "spruce000|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

[HKLM\SOFTWARE\ConsumerInput\Common]
"panelistid" = "1SPRP1317DD700B7B8168B64905B99F66F2368BAF1B"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"lang" = "en"

[HKLM\SOFTWARE\ConsumerInput\Common]
"UserAppDataLocal" = "%Documents and Settings%\%current user%\Local Settings\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\ConsumerInput\Common]
"InstallationType" = "CIMI"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC 81 73 94 6A E9 B4 11 6C 1F ED 26 69 4E 14 BD"

[HKLM\SOFTWARE\ConsumerInput\Common]
"eulaVersion" = "120140910"
"UserAppData" = "%Documents and Settings%\%current user%\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"client" = "spruce000|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"Name" = "Consumer Input Firefox Extension"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"Name" = "Consumer Input Internet Explorer Extension"

[HKLM\SOFTWARE\ConsumerInput\Common]
"lang" = "1en"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"Name" = "Consumer Input Monitoring Tool"

The process dca-host.exe:1088 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\DcaHost.DcaHost.1\CLSID]
"(Default)" = "{7D87094D-49E1-4C72-8C9E-3D937A119BE5}"

[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\TypeLib\{294BC5A4-7157-4131-AB81-1DEC393D0F0A}\1.0]
"(Default)" = "DcaHost 1.0 Type Library"

[HKCR\AppID\dca-host.exe]
"AppID" = "{D5FA0C65-08BE-4F86-B30F-2E285694863A}"

[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\dca-host.exe"

[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}\TypeLib]
"Version" = "1.0"

[HKCR\DcaHost.DcaHost]
"(Default)" = "DcaHost Class"

[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}]
"(Default)" = "IDcaHostSink"

[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"AppID" = "{D5FA0C65-08BE-4F86-B30F-2E285694863A}"

[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"Policy" = "3"

[HKCR\TypeLib\{294BC5A4-7157-4131-AB81-1DEC393D0F0A}\1.0\FLAGS]
"(Default)" = "0"

[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"AppPath" = "%Program Files%\Consumer Input\InternetExplorer"

[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}\TypeLib]
"(Default)" = "{294BC5A4-7157-4131-AB81-1DEC393D0F0A}"

[HKCR\AppID\{D5FA0C65-08BE-4F86-B30F-2E285694863A}]
"(Default)" = "dca-host"

[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}\VersionIndependentProgID]
"(Default)" = "DcaHost.DcaHost"

[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}\TypeLib]
"(Default)" = "{294BC5A4-7157-4131-AB81-1DEC393D0F0A}"

[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}\ProgID]
"(Default)" = "DcaHost.DcaHost.1"

[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}\TypeLib]
"Version" = "1.0"

[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\TypeLib\{294BC5A4-7157-4131-AB81-1DEC393D0F0A}\1.0\0\win32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\dca-host.exe"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C7 29 E4 96 31 79 E3 3D 89 4A 71 5F 3A B2 7E 52"

[HKCR\DcaHost.DcaHost\CurVer]
"(Default)" = "DcaHost.DcaHost.1"

[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"(Default)" = "DcaHost Class"

[HKCR\DcaHost.DcaHost.1]
"(Default)" = "DcaHost Class"

[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}]
"(Default)" = "IDcaHost"

[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"AppName" = "dca-host.exe"

[HKCR\TypeLib\{294BC5A4-7157-4131-AB81-1DEC393D0F0A}\1.0\HELPDIR]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer"

[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\DcaHost.DcaHost\CLSID]
"(Default)" = "{7D87094D-49E1-4C72-8C9E-3D937A119BE5}"

The process nsf8.tmp:928 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0E 38 29 C4 FF A9 D0 E8 90 DC EC C7 6D AC A8 55"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer]
"NoRepair" = "1"
"NoModify" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{0ABC687F-FA5B-481F-879D-EBE9DD6CF8DD}]
"pv" = "3.2.4.4285"
"Name" = "Consumer Input Uninstaller Update"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer]
"DisplayIcon" = "%Program Files%\Consumer Input\CIuninstall.ico"
"Publisher" = "Compete Inc."
"DisplayName" = "Consumer Input (remove only)"
"InstallLocation" = "%Program Files%\Consumer Input"
"UninstallString" = "%Program Files%\Consumer Input\CIuninstall.exe"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{0ABC687F-FA5B-481F-879D-EBE9DD6CF8DD}]
"lang" = "en"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{0ABC687F-FA5B-481F-879D-EBE9DD6CF8DD}]
"client" = "spruce000|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

The process schtasks.exe:1068 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D1 92 0D E4 AB FF AF B1 00 FB 8F 2C 63 A5 99 D0"

The process schtasks.exe:1880 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "39 13 C8 6F D5 22 2D 54 6E D3 DC 2C 49 F7 43 D5"

The process ciff-3.2.0-12191.exe:3396 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "29 4D 39 8B 14 32 E0 62 8D F5 BB 0C 66 F8 AB DB"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Products\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"InstallDir" = "%Program Files%\Consumer Input\Firefox"
"InstallTime" = "1443999913"
"UninstallPath" = "%Program Files%\Consumer Input\Firefox\uninstall.exe /S"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Mozilla\Firefox\Extensions]
"ConsumerInput@Compete" = "%Program Files%\Consumer Input\Firefox\ciff-3.2.0-12191.xpi"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"Name" = "Consumer Input FF"
"lang" = "en"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"client" = "spruce000fox|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"pv" = "3.2.0.12191"

The process %original file name%.exe:580 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E5 DE 1B 5D 7C E2 D9 C8 43 D3 D0 00 B9 03 F7 A2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"

The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The Trojan deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"

The process nsaB.tmp:456 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "02 CB 54 E0 E6 D3 9D 0C 64 4F 9F CA F9 F9 31 7B"

The process ConsumerInputUpdate.exe:1852 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastCheckSuccess" = "1443999928"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\F]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"client" = "spruce000|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"client" = "spruce000|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"InstallTime" = "1443999922"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastCheckSuccess" = "1443999923"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\A]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastCheckSuccess" = "1443999913"

[HKCU\Software\ConsumerInput\Update\proxy]
"source" = "IE"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\D]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"lang" = "en"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"InstallTime" = "1443999913"
"brand" = "GGLS"
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"brand" = "GGLS"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"InstallTime" = "1443999926"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "53 B5 47 25 29 CC 3E 78 2A 3F F4 F8 1C C8 44 28"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"client" = "spruce000|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\C]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\75E0ABB6138512271C04F85FDDDE38E4B7242EFE]
"Blob" = "19 00 00 00 01 00 00 00 10 00 00 00 A8 82 7A 3C"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"brand" = "GGLS"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"lang" = "en"

[HKU\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
"ParseAutoexec" = "1"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"lang" = "en"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"tttoken"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientStateMedium\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"eulaaccepted"

[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerExtraCode1"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerResult"
"ap"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastInstallerError"

[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerError"
"LastInstallerResultUIString"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerError"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"UpdateAvailableCount"
"eulaaccepted"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"UpdateAvailableSince"
"UpdateAvailableCount"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"experiment_labels"

[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerSuccessLaunchCmdLine"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerError"

[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"75E0ABB6138512271C04F85FDDDE38E4B7242EFE"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerSuccessLaunchCmdLine"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerSuccessLaunchCmdLine"

[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerExtraCode1"

[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"c"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerExtraCode1"

[HKLM\SOFTWARE\ConsumerInput\Update]
"uid"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientStateMedium\{1138A907-2253-45D6-99C1-843A0AC58730}]
"eulaaccepted"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastInstallerSuccessLaunchCmdLine"
"UpdateAvailableSince"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"experiment_labels"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastInstallerExtraCode1"
"LastInstallerResultUIString"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"browser"
"UpdateAvailableSince"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"iid"
"eulaaccepted"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"tttoken"
"iid"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"UpdateAvailableCount"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"browser"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"iid"
"tttoken"
"ap"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerResultUIString"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastInstallerResult"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerResult"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientStateMedium\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"eulaaccepted"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"ap"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"experiment_labels"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"browser"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerResultUIString"

[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerResult"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"eulaaccepted"

The process ConsumerInputUpdate.exe:1072 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc.1.0\CLSID]
"(Default)" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

[HKCR\AppID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"ServiceParameters" = "/comsvc"

[HKCR\AppID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"LocalService" = "consumerinput_updatem"

[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebSvc"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc.1.0]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\AppID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"(Default)" = "ServiceModule"

[HKCR\ConsumerInputUpdate.Update3WebSvc\CLSID]
"(Default)" = "{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}"

[HKCR\ConsumerInputUpdate.CoreClass\CLSID]
"(Default)" = "{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}"

[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3COMClassService.1.0"

[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}]
"AppID" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

[HKCR\ConsumerInputUpdate.CoreClass.1]
"(Default)" = "Google Update Core Class"

[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\ConsumerInputUpdate.Update3COMClassService.1.0]
"(Default)" = "Update3COMClass"

[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassSvc"

[HKCR\ConsumerInputUpdate.Update3WebSvc.1.0\CLSID]
"(Default)" = "{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}"

[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}\ProgID]
"(Default)" = "ConsumerInputUpdate.CoreClass.1"

[HKCR\ConsumerInputUpdate.CoreClass]
"(Default)" = "Google Update Core Class"

[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"AppID" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"(Default)" = "Update3COMClass"

[HKCR\ConsumerInputUpdate.Update3WebSvc\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3WebSvc.1.0"

[HKCR\ConsumerInputUpdate.Update3WebSvc.1.0]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\ConsumerInputUpdate.Update3COMClassService\CLSID]
"(Default)" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"

[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CoreClass"

[HKCR\ConsumerInputUpdate.Update3COMClassService]
"(Default)" = "Update3COMClass"

[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"AppID" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"

[HKCR\ConsumerInputUpdate.Update3COMClassService.1.0\CLSID]
"(Default)" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"

[HKCR\ConsumerInputUpdate.Update3COMClassService\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3COMClassService.1.0"

[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebSvc.1.0"

[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}]
"(Default)" = "Google Update Core Class"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "72 2C 09 0D DB 68 5B 4D 35 12 C3 CB B1 37 BD F9"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc\CLSID]
"(Default)" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc\CurVer]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassSvc.1.0"

[HKCR\AppID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"(Default)" = "ServiceModule"

[HKCR\ConsumerInputUpdate.CoreClass.1\CLSID]
"(Default)" = "{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}"

[HKCR\ConsumerInputUpdate.Update3WebSvc]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\ConsumerInputUpdate.CoreClass\CurVer]
"(Default)" = "ConsumerInputUpdate.CoreClass.1"

[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3COMClassService"

[HKCR\AppID\ConsumerInputUpdate.exe]
"AppID" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}\ProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassSvc.1.0"

[HKCR\AppID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"LocalService" = "consumerinput_update"

[HKCR\AppID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"ServiceParameters" = "/comsvc"

[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}]
"AppID" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

The Trojan deletes the following registry key(s):

[HKCR\AppID\ConsumerInputUpdate.exe]

The process ConsumerInputUpdate.exe:164 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D0 B1 21 EB 64 93 F5 BE 9D B2 FC 75 D6 9E F4 D5"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ConsumerInputUpdate.exe]
"DisableExceptionChainValidation" = "0"

[HKLM\SOFTWARE\ConsumerInput\Update]
"Path" = "%Program Files%\Consumer Input\Update\ConsumerInputUpdate.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Program Files%\Consumer Input\Update]
"ConsumerInputUpdate.exe" = "ConsumerInput Update"

[HKLM\SOFTWARE\ConsumerInput\Update]
"Version" = "1.3.25.309"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"InstallTime" = "1443999893"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"pv" = "1.3.25.309"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"brand" = "GGLS"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"pv" = "1.3.25.309"
"Name" = "ConsumerInput Update"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"client" = "spruce000|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"UpdateAvailableCount"

[HKLM\SOFTWARE\ConsumerInput\Update]
"mi"
"LastChecked"
"eulaaccepted"
"uid"
"ui"

[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"UpdateAvailableSince"

[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"c"

The process ConsumerInputUpdate.exe:824 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9B 66 B3 3B 29 14 2F 88 C1 1A 1E 6F D9 42 08 96"

[HKCU\Software\ConsumerInput\Update\proxy]
"source" = "IE"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"
"c"

The process ConsumerInputUpdate.exe:372 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3E 60 F0 F0 29 A4 A1 16 FA A3 87 83 CA 0A 9F 28"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"c"
"sk"

[HKLM\SOFTWARE\ConsumerInput\Update]
"eulaaccepted"

The process ConsumerInputUpdate.exe:912 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\Interface\{4F3440C0-EB6A-46F2-94D8-2D74A0D21C5D}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.CoreMachineClass.1]
"(Default)" = "Google Update Core Class"

[HKCR\Interface\{977ED000-4ECA-454D-AEA2-11824E57A043}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{FFA4D25D-8411-40F8-919D-3C4CD94FBD29}\NumMethods]
"(Default)" = "8"

[HKCR\Interface\{37EB1FA3-2181-4EED-8C9F-363068501901}]
"(Default)" = "IAppBundle"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\Interface\{58AC6DE8-F15B-4C6A-91D7-B8FA6A2F4169}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\ConsumerInputUpdate.Update3WebMachine]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine\CurVer]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachine.1.0"

[HKCR\Interface\{41E3E6E6-3E50-4F6E-A1F8-1E24440BC6F8}]
"(Default)" = "IApp"

[HKCR\Interface\{592DA852-5C4E-49F8-88BC-EA0A893180C6}]
"(Default)" = "ICoCreateAsync"

[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}]
"(Default)" = "ConsumerInputUpdate CredentialDialog"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\Interface\{52C0A3BA-1DE8-477D-91F4-F82D3824C304}]
"(Default)" = "IGoogleUpdate3Web"

[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}\ProgID]
"(Default)" = "ConsumerInputUpdate.ProcessLauncher.1.0"

[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}\InprocHandler32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll"

[HKCR\ConsumerInputUpdate.CoCreateAsync\CLSID]
"(Default)" = "{87A125E5-B663-496F-954E-488A82FAC012}"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\ProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachine.1.0"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\Interface\{5E8F3A92-7544-482D-9D34-FFD702697D16}\NumMethods]
"(Default)" = "10"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachine"

[HKCR\ConsumerInputUpdate.CoCreateAsync\CurVer]
"(Default)" = "ConsumerInputUpdate.CoCreateAsync.1.0"

[HKCR\Interface\{E3B8A2CD-70B5-49A4-BFD6-0180BE487A4C}]
"(Default)" = "IAppVersionWeb"

[HKCR\Interface\{CCE83B2E-3794-41FC-8179-46BFEA22148A}]
"(Default)" = "IGoogleUpdate"

[HKCR\Interface\{2A142934-F3E4-4D68-A360-3FE35783E849}]
"(Default)" = "IJobObserver"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"

[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}]
"(Default)" = "ConsumerInput.OneClickProcessLauncher"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachine"

[HKCR\ConsumerInputUpdate.ProcessLauncher]
"(Default)" = "Google Update Process Launcher Class"

[HKCR\ConsumerInputUpdate.CoreMachineClass\CurVer]
"(Default)" = "ConsumerInputUpdate.CoreMachineClass.1"

[HKCR\ConsumerInputUpdate.CoCreateAsync]
"(Default)" = "CoCreateAsync"

[HKCR\Interface\{FA326D8A-B632-4BCE-858E-12271ABAF613}\NumMethods]
"(Default)" = "10"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}\InprocServer32]
"ThreadingModel" = "Both"

[HKCR\Interface\{5A43377F-504A-4FC4-8575-9C98997788BF}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{0E02C3DE-FDA9-4381-99E6-7ED76A518504}\InProcServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll"

[HKCR\Interface\{FFA4D25D-8411-40F8-919D-3C4CD94FBD29}]
"(Default)" = "IRegistrationUpdateHook"

[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CoCreateAsync"

[HKCR\Interface\{2A142934-F3E4-4D68-A360-3FE35783E849}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\Interface\{FB3B0E75-E48E-47C4-BA52-57B7F6E38510}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{268205B6-13E6-4FA2-A1EF-84E4E59F3F1B}\NumMethods]
"(Default)" = "6"

[HKCR\Interface\{FA326D8A-B632-4BCE-858E-12271ABAF613}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{58AC6DE8-F15B-4C6A-91D7-B8FA6A2F4169}\NumMethods]
"(Default)" = "10"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine.1.0\CLSID]
"(Default)" = "{F90B8F59-792D-4F5A-97AD-06E83284F9AB}"

[HKCR\Interface\{837641EA-9158-43EE-B2A1-9CEDC5CBD98F}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachine.1.0"

[HKCR\Interface\{AC992757-3DEC-43C4-8D9D-AA82F8A857E4}]
"(Default)" = "IBrowserHttpRequest2"

[HKCR\Interface\{5A43377F-504A-4FC4-8575-9C98997788BF}\NumMethods]
"(Default)" = "10"

[HKCR\Interface\{CB21D37D-1DD1-444A-AB6A-AE623DF7B4E4}\NumMethods]
"(Default)" = "4"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\Interface\{55D12CB4-DA12-43D6-8100-90174ABBB84F}\NumMethods]
"(Default)" = "14"

[HKCR\ConsumerInputUpdate.ProcessLauncher.1.0]
"(Default)" = "Google Update Process Launcher Class"

[HKCR\ConsumerInputUpdate.ProcessLauncher\CLSID]
"(Default)" = "{5CF02202-6278-47EE-9947-C2D0A057EABD}"

[HKCR\Interface\{CB21D37D-1DD1-444A-AB6A-AE623DF7B4E4}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.Update3WebMachine\CLSID]
"(Default)" = "{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}"

[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}]
"(Default)" = "Google Update Process Launcher Class"

[HKCR\Interface\{AC992757-3DEC-43C4-8D9D-AA82F8A857E4}\NumMethods]
"(Default)" = "4"

[HKCR\Interface\{837641EA-9158-43EE-B2A1-9CEDC5CBD98F}\NumMethods]
"(Default)" = "4"

[HKCR\Interface\{268205B6-13E6-4FA2-A1EF-84E4E59F3F1B}]
"(Default)" = "IProcessLauncher"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine]
"(Default)" = "ConsumerInputUpdate CredentialDialog"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachineFallback.1.0"

[HKCR\Interface\{977ED000-4ECA-454D-AEA2-11824E57A043}\NumMethods]
"(Default)" = "9"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback.1.0\CLSID]
"(Default)" = "{0C6D49F4-6E41-4632-BE86-F210D5D894BA}"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback\CLSID]
"(Default)" = "{0C6D49F4-6E41-4632-BE86-F210D5D894BA}"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachineFallback"

[HKCR\ConsumerInputUpdate.Update3WebMachine.1.0\CLSID]
"(Default)" = "{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}"

[HKCR\Interface\{FA326D8A-B632-4BCE-858E-12271ABAF613}]
"(Default)" = "IPackage"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine\CLSID]
"(Default)" = "{3A40DF53-EB22-49FE-9246-8084403424E7}"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\Interface\{592DA852-5C4E-49F8-88BC-EA0A893180C6}\NumMethods]
"(Default)" = "4"

[HKCR\Interface\{5E8F3A92-7544-482D-9D34-FFD702697D16}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{55D12CB4-DA12-43D6-8100-90174ABBB84F}]
"(Default)" = "IAppWeb"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback.1.0]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine.1.0]
"(Default)" = "ConsumerInput.OneClickProcessLauncher"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5C A0 A9 81 9E 5B 36 46 8B CF B8 F6 8C 1F 13 BC"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine\CLSID]
"(Default)" = "{F90B8F59-792D-4F5A-97AD-06E83284F9AB}"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine.1.0]
"(Default)" = "ConsumerInputUpdate CredentialDialog"

[HKCR\Interface\{FB3B0E75-E48E-47C4-BA52-57B7F6E38510}]
"(Default)" = "IAppBundleWeb"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\Interface\{592DA852-5C4E-49F8-88BC-EA0A893180C6}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.CoCreateAsync.1.0]
"(Default)" = "CoCreateAsync"

[HKCR\Interface\{7096D298-02B5-4AE9-94E1-C16E27553D17}]
"(Default)" = "IGoogleUpdateCore"

[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CredentialDialogMachine"

[HKCR\Interface\{5A43377F-504A-4FC4-8575-9C98997788BF}]
"(Default)" = "ICoCreateAsyncStatus"

[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}\InprocHandler32]
"ThreadingModel" = "Both"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\ProgID]
"(Default)" = "ConsumerInputUpdate.CoreMachineClass.1"

[HKCR\Interface\{C59D48E5-082B-4BB6-9838-BA261C4FBD5C}\NumMethods]
"(Default)" = "24"

[HKCR\Interface\{41E3E6E6-3E50-4F6E-A1F8-1E24440BC6F8}\NumMethods]
"(Default)" = "40"

[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}\ProgID]
"(Default)" = "ConsumerInputUpdate.CredentialDialogMachine.1.0"

[HKCR\Interface\{E3B8A2CD-70B5-49A4-BFD6-0180BE487A4C}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{55D12CB4-DA12-43D6-8100-90174ABBB84F}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{7096D298-02B5-4AE9-94E1-C16E27553D17}\NumMethods]
"(Default)" = "4"

[HKCR\Interface\{FFA4D25D-8411-40F8-919D-3C4CD94FBD29}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{0E02C3DE-FDA9-4381-99E6-7ED76A518504}]
"(Default)" = "PSFactoryBuffer"

[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}\InprocServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine\CLSID]
"(Default)" = "{8AF9C44C-E497-4776-A7EF-F6455F982825}"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\Elevation]
"Enabled" = "1"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CoreMachineClass"

[HKCR\ConsumerInputUpdate.CoreMachineClass]
"(Default)" = "Google Update Core Class"

[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}]
"CLSID" = "{F90B8F59-792D-4F5A-97AD-06E83284F9AB}"

[HKCR\Interface\{2A142934-F3E4-4D68-A360-3FE35783E849}\NumMethods]
"(Default)" = "13"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine.1.0\CLSID]
"(Default)" = "{8AF9C44C-E497-4776-A7EF-F6455F982825}"

[HKCR\Interface\{977ED000-4ECA-454D-AEA2-11824E57A043}]
"(Default)" = "IProgressWndEvents"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\ConsumerInputUpdate.ProcessLauncher\CurVer]
"(Default)" = "ConsumerInputUpdate.ProcessLauncher.1.0"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine]
"(Default)" = "ConsumerInput.OneClickProcessLauncher"

[HKCR\Interface\{41E3E6E6-3E50-4F6E-A1F8-1E24440BC6F8}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{37EB1FA3-2181-4EED-8C9F-363068501901}\NumMethods]
"(Default)" = "39"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3WebMachineFallback.1.0"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\Elevation]
"Enabled" = "1"

[HKCR\Interface\{E3B8A2CD-70B5-49A4-BFD6-0180BE487A4C}\NumMethods]
"(Default)" = "10"

[HKCR\Interface\{CCE83B2E-3794-41FC-8179-46BFEA22148A}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}]
"Policy" = "3"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine\CurVer]
"(Default)" = "ConsumerInput.OneClickProcessLauncherMachine.1.0"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\Elevation]
"Enabled" = "1"

[HKCR\Interface\{58AC6DE8-F15B-4C6A-91D7-B8FA6A2F4169}]
"(Default)" = "IGoogleUpdate3"

[HKCR\Interface\{4F3440C0-EB6A-46F2-94D8-2D74A0D21C5D}\NumMethods]
"(Default)" = "4"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\Elevation]
"Enabled" = "1"

[HKCR\Interface\{37EB1FA3-2181-4EED-8C9F-363068501901}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{52C0A3BA-1DE8-477D-91F4-F82D3824C304}\NumMethods]
"(Default)" = "8"

[HKCR\Interface\{C59D48E5-082B-4BB6-9838-BA261C4FBD5C}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{0E02C3DE-FDA9-4381-99E6-7ED76A518504}\InProcServer32]
"ThreadingModel" = "Both"

[HKCR\Interface\{CB21D37D-1DD1-444A-AB6A-AE623DF7B4E4}]
"(Default)" = "ICredentialDialog"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}]
"(Default)" = "Google Update Core Class"

[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}\ProgID]
"(Default)" = "ConsumerInput.OneClickProcessLauncherMachine.1.0"

[HKCR\ConsumerInputUpdate.CoCreateAsync.1.0\CLSID]
"(Default)" = "{87A125E5-B663-496F-954E-488A82FAC012}"

[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}\VersionIndependentProgID]
"(Default)" = "ConsumerInput.OneClickProcessLauncherMachine"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\Interface\{837641EA-9158-43EE-B2A1-9CEDC5CBD98F}]
"(Default)" = "IGoogleUpdate3WebSecurity"

[HKCR\Interface\{4F3440C0-EB6A-46F2-94D8-2D74A0D21C5D}]
"(Default)" = "IOneClickProcessLauncher"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\ProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\Interface\{5E8F3A92-7544-482D-9D34-FFD702697D16}]
"(Default)" = "IAppVersion"

[HKCR\ConsumerInputUpdate.Update3WebMachine\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3WebMachine.1.0"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\Interface\{268205B6-13E6-4FA2-A1EF-84E4E59F3F1B}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{7096D298-02B5-4AE9-94E1-C16E27553D17}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine.1.0]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\Interface\{C59D48E5-082B-4BB6-9838-BA261C4FBD5C}]
"(Default)" = "ICurrentState"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0\CLSID]
"(Default)" = "{65BF611F-85CD-4E7F-966C-853573462C14}"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachineFallback"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\ConsumerInputUpdate.Update3WebMachine.1.0]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\Elevation]
"Enabled" = "1"

[HKCR\Interface\{52C0A3BA-1DE8-477D-91F4-F82D3824C304}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{AC992757-3DEC-43C4-8D9D-AA82F8A857E4}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}\ProgID]
"(Default)" = "ConsumerInputUpdate.CoCreateAsync.1.0"

[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}]
"(Default)" = "CoCreateAsync"

[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\Interface\{FB3B0E75-E48E-47C4-BA52-57B7F6E38510}\NumMethods]
"(Default)" = "24"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback\CurVer]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback\CLSID]
"(Default)" = "{65BF611F-85CD-4E7F-966C-853573462C14}"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\ConsumerInputUpdate.ProcessLauncher.1.0\CLSID]
"(Default)" = "{5CF02202-6278-47EE-9947-C2D0A057EABD}"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine\CurVer]
"(Default)" = "ConsumerInputUpdate.CredentialDialogMachine.1.0"

[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.ProcessLauncher"

[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"

[HKCR\Interface\{CCE83B2E-3794-41FC-8179-46BFEA22148A}\NumMethods]
"(Default)" = "5"

[HKCR\ConsumerInputUpdate.CoreMachineClass.1\CLSID]
"(Default)" = "{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine.1.0\CLSID]
"(Default)" = "{3A40DF53-EB22-49FE-9246-8084403424E7}"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\ConsumerInputUpdate.CoreMachineClass\CLSID]
"(Default)" = "{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}]
[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}\InprocHandler32]
[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}\InprocServer32]
[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}]

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"
"c"

The process dca-monitoring.exe:2100 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB 74 F9 A8 0D 32 20 00 70 A8 96 05 B8 2A 94 1D"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKCU\Software\Compete\Monitoring]
"lastLifetimeReportTime" = "1443999928"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKCU\Software\Compete\Monitoring]
"lastCookieReportTime" = "1443999928"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"

The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

"UNCAsIntranet" = "1"

The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:

"IntranetName" = "1"

The process ciie-3.2.0-12413.exe:1560 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\ProgID]
"(Default)" = "dcabho.Dca.1"

[HKCR\dcabho.Dca.1\CLSID]
"(Default)" = "{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}"

[HKCR\CptUrlPassthru.HttpMonitor]
"(Default)" = "CHttpMonitor Object"

[HKLM\SOFTWARE\ConsumerInput\Products\{1138A907-2253-45D6-99C1-843A0AC58730}]
"InstallTime" = "1443999923"

[HKCR\CptUrlPassthru.HttpMonitor.1]
"(Default)" = "CHttpMonitor Object"

[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\ProgID]
"(Default)" = "CptUrlPassthru.HttpMonitor.1"

[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}\TypeLib]
"Version" = "1.0"

[HKCR\CptUrlPassthru.HttpHeaders.1]
"(Default)" = "CHttpHeadersImpl Object"

[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\TypeLib]
"(Default)" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"

[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\InprocServer32]
"ThreadingModel" = "apartment"

[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}\TypeLib]
"Version" = "1.0"

[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\VersionIndependentProgID]
"(Default)" = "CptUrlPassthru.HttpHeaders"

[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\Implemented Categories]
"(Default)" = ""

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"Name" = "Consumer Input IE"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCR\AppID\{DD7C44CC-0F60-4FD9-A38F-5CF30D698AC2}]
"(Default)" = "dcabho"

[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\TypeLib]
"(Default)" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"

[HKCR\AppID\dca-bho.DLL]
"AppID" = "{DD7C44CC-0F60-4FD9-A38F-5CF30D698AC2}"

[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}\TypeLib]
"(Default)" = "{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}"

[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\Implemented Categories\{59fb2056-d625-48d0-a944-1a85b5ab2640}]
"(Default)" = ""

[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\TypeLib\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}\1.0\0\win32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll"

[HKCU\Software\Compete]
"Install_Dir" = "%Program Files%\Consumer Input\InternetExplorer"

[HKCR\CptUrlPassthru.HttpHeaders\CurVer]
"(Default)" = "CptUrlPassthru.HttpHeaders.1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}\TypeLib]
"(Default)" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"

[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\InprocServer32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll"

[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}\TypeLib]
"(Default)" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"

[HKCR\dcabho.Dca]
"(Default)" = "Dca Class"

[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}]
"(Default)" = "Consumer Input DCA BHO"

[HKCR\TypeLib\{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}\1.0]
"(Default)" = "DcaBho 1.0 Type Library"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}]
"AppID" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"

[HKCU\Software\Compete\DCA]
"ExePath" = "Created to make other products detect new dca-bho"

[HKCR\CptUrlPassthru.HttpMonitor\CLSID]
"(Default)" = "{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}"

[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}]
"(Default)" = "IHttpMonitor"

[HKCR\CptUrlPassthru.HttpHeaders]
"(Default)" = "CHttpHeadersImpl Object"

[HKCR\TypeLib\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}\1.0\HELPDIR]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer"

[HKCR\CptUrlPassthru.HttpMonitor\CurVer]
"(Default)" = "CptUrlPassthru.HttpMonitor.1"

[HKCR\dcabho.Dca.1]
"(Default)" = "Dca Class"

[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\InprocServer32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll"

[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\VersionIndependentProgID]
"(Default)" = "CptUrlPassthru.HttpMonitor"

[HKCR\CptUrlPassthru.HttpHeaders.1\CLSID]
"(Default)" = "{82025773-B1B0-497b-B942-0171A2E42C3C}"

[HKCU\Software\Compete\DCA]
"PanelName" = "Consumer Input"

[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}]
"(Default)" = "CHttpHeadersImpl Object"

[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\ProgID]
"(Default)" = "CptUrlPassthru.HttpHeaders.1"

[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCU\Software\Compete\Monitoring]
"forceCiiePostInstallPage" = "1"

[HKCR\CptUrlPassthru.HttpMonitor.1\CLSID]
"(Default)" = "{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}"

[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}]
"AppID" = "{DD7C44CC-0F60-4FD9-A38F-5CF30D698AC2}"

[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"lang" = "en"

[HKLM\SOFTWARE\ConsumerInput\Products\{1138A907-2253-45D6-99C1-843A0AC58730}]
"UninstallPath" = "%Program Files%\Consumer Input\InternetExplorer\uninstall.exe /S"
"InstallDir" = "%Program Files%\Consumer Input\InternetExplorer"

[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}\TypeLib]
"Version" = "1.0"

[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\dcabho.Dca\CurVer]
"(Default)" = "dcabho.Dca.1"

[HKCR\TypeLib\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}\1.0\FLAGS]
"(Default)" = "0"

[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}]
"AppID" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"

[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CptUrlPassthru.HttpHeaders\CLSID]
"(Default)" = "{82025773-B1B0-497b-B942-0171A2E42C3C}"

[HKCR\AppID\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}]
"(Default)" = "CptUrlPassthru"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "70 9E 87 D4 E7 31 A7 80 2D F3 55 62 96 BE 05 08"

[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}]
"(Default)" = "IDcaBho"

[HKCR\AppID\CptUrlPassthru.DLL]
"AppID" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"

[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\VersionIndependentProgID]
"(Default)" = "dcabho.Dca"

[HKCR\dcabho.Dca\CLSID]
"(Default)" = "{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"pv" = "3.2.0.12413"

[HKCR\TypeLib\{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}\1.0\0\win32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\dca-bho.dll"

[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}]
"(Default)" = "IHttpHeaders"

[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\InprocServer32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\dca-bho.dll"

[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}]
"(Default)" = "CHttpMonitor Object"

[HKCR\TypeLib\{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}\1.0\FLAGS]
"(Default)" = "0"

[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\InprocServer32]
"ThreadingModel" = "apartment"

[HKCR\TypeLib\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}\1.0]
"(Default)" = "CptUrlPassthru 1.0 Type Library"

[HKCR\TypeLib\{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}\1.0\HELPDIR]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer"

[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\TypeLib]
"(Default)" = "{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}"

It registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every time Internet Explorer is run. It does this by creating the following registry key(s)/entry(ies):

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}]
"(Default)" = "DCA"

"NoExplorer" = "1"

The process cimt-3.2.1-1112.exe:308 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7F 2F 41 1E D5 A1 04 91 3D 54 8B 79 C9 87 DF E5"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"

[HKLM\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.compete.cinm]
"(Default)" = "%Program Files%\Consumer Input\Monitoring\manifest.json"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Products\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"InstallDir" = "%Program Files%\Consumer Input\Monitoring"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"client" = "spruce000|SPRP1317DD700B7B8168B64905B99F66F2368BAF1B|{4685EBED-0A3F-4F36-96AE-063EEC1B2C95}"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"pv" = "3.2.1.1112"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Products\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"UninstallPath" = "%Program Files%\Consumer Input\Monitoring\uninstall.exe /S"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"lang" = "en"
"Name" = "Consumer Input MT"

The Trojan deletes the following value(s) in system registry:
The Trojan disables automatic startup of the application by deleting the following autorun value:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Consumer Input Monitoring Tool"

Dropped PE files

MD5 File path
4cf3a81ab4579b30117c8a39a489d51d c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nse7.tmp\System.dll
0bea21545b130f74ad40160ae8ac05ea c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nse7.tmp\UAC.dll
ec39f9027310231c2af374e6a2a8f733 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nse7.tmp\nsis_plugin.dll
a9c69837ec78126315335e6814781730 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsv5.tmp
3cf748507f4a0eae62906ac7dec93068 c:\Program Files\Consumer Input\CIuninstall.exe
f2f06693c1e1b009b8be559551baee15 c:\Program Files\Consumer Input\Firefox\uninstall.exe
00a5e194e31d6853ccd384ef844708d0 c:\Program Files\Consumer Input\InternetExplorer\cookie-retriever.exe
a9921ebe348c1ee4d20425e479faf46d c:\Program Files\Consumer Input\InternetExplorer\cpturlpassthru.dll
c77917ddc253dcdad3e3e559968f5321 c:\Program Files\Consumer Input\InternetExplorer\dca-bho.dll
f5e1dfce9585bc9afd2439989143e64a c:\Program Files\Consumer Input\InternetExplorer\dca-host.exe
b0bf419c9ec9bad55a70904a9461184f c:\Program Files\Consumer Input\InternetExplorer\mozjs185-1.0.dll
076eb3ea15e8b59c1dc03a51b35bfa9e c:\Program Files\Consumer Input\InternetExplorer\uninstall.exe
d6d754022717f01a7919c40181b85149 c:\Program Files\Consumer Input\Monitoring\cinm-host.exe
bef666043fafb12c4f17982c996792a3 c:\Program Files\Consumer Input\Monitoring\cookie-retriever.exe
e73ed31d690fb00f72c84ed1f7af556b c:\Program Files\Consumer Input\Monitoring\dca-monitoring.exe
85e046fd828d356eeebd8b9e790dbf24 c:\Program Files\Consumer Input\Monitoring\uninstall.exe
7b110c27e90217ff3bd49cef739a2e1d c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputCrashHandler.exe
7b110c27e90217ff3bd49cef739a2e1d c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputUpdate.exe
14f8e799e11716ce374d42cc6cbf6ede c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe
a5f9015e3152964a06cc1fb09421813e c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe
6d0f507eb95e528f4801d7dd8d613c4f c:\Program Files\Consumer Input\Update\1.3.25.309\goopdate.dll
5aaf1b0f0275aecbc12f823e75dd2a69 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_de.dll
75e9268adff3a743e9bc0253070fa1fb c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_en.dll
8e3f614721e2c5595f589b834a1aad70 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_es-419.dll
190510f059639a91717d5435ee7746b6 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_es.dll
c95a2759959f049e776bc760fac5e401 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_fr.dll
0dcf385404aed30f0e14b855dd8ac347 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_ja.dll
73464572702ac3373953526e5f455a84 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_zh-CN.dll
8501135f1cea578e4d279722e25d67d2 c:\Program Files\Consumer Input\Update\1.3.25.309\psmachine.dll
2691bb6326ff0ac20f76bc1d3ffe9157 c:\Program Files\Consumer Input\Update\1.3.25.309\psuser.dll
7b110c27e90217ff3bd49cef739a2e1d c:\Program Files\Consumer Input\Update\ConsumerInputUpdate.exe
5a109eddeb5ccc1f6a7e79559668b36a c:\Program Files\Consumer Input\Update\Download\{1138A907-2253-45D6-99C1-843A0AC58730}\0.0.0.0\ciie-3.2.0-12413.exe
bf40b7f06d1b4ae9ace02551be2c8dfc c:\Program Files\Consumer Input\Update\Download\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}\0.0.0.0\cimt-3.2.1-1112.exe
a8840f9a1a7138959db252ba17a10d5d c:\Program Files\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0\ciff-3.2.0-12191.exe
5a109eddeb5ccc1f6a7e79559668b36a c:\Program Files\Consumer Input\Update\Install\{ADDC1D41-A5C8-4D63-88D1-EEC74D21B769}\ciie-3.2.0-12413.exe
a8840f9a1a7138959db252ba17a10d5d c:\Program Files\Consumer Input\Update\Install\{DE282511-3FBA-42AF-9FE1-88D68624AED7}\ciff-3.2.0-12191.exe
bf40b7f06d1b4ae9ace02551be2c8dfc c:\Program Files\Consumer Input\Update\Install\{E8858BE5-C8E2-42D0-856A-1E1AC167BFA4}\cimt-3.2.1-1112.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 23462 23552 4.51398 9d64b6ac6eb1aa41e38f6cc8798b652e
.rdata 28672 4496 4608 3.59163 f179218a059068529bdb4637ef5fa28e
.data 36864 3774424 1024 3.26654 af685ae5a632e08acd6c90a62cdfc3bb
.ndata 3813376 2068480 0 0 d41d8cd98f00b204e9800998ecf8427e
.rsrc 5881856 1736 2048 2.02827 0656895bc4ebf2b2fc5bf7fb2c4fe3e7

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

Total found: 25
8002fc0d24128006d3d5381415ef9a4a
fd5fae6b98675b7c0e6b1d00eef9ff4c
c9d977c217713f2c6f64048f4f897224
ee3eabfdd2f7eca0cf831a114cb79942
5d5528266d7be56144604d72712f6b32
a12fc20ab566fd97a9c74c48256a6a0f
9b16246fed47ee4e3806a551bb7fb3e2
ce8298657d2b8865a3f2663373352c5e
3f620621c2bd076a91f38b48cc48d7bb
fb6262c0dac702f8d4aa995b8d283388
1d5133ccb6eb69dc1a567402d614df24
953156b2aa6af41ad42512985619a911
306f2885222f7a97657a60f54beecd3d
d4ebe61e710b730de7aa4641e8b7af64
ca889f0aa9fd8815bb868f27ffb3d970
0e83e7ab709c96c3860d2afa4cded371
f3189b8c77a10b6fe41dea3dca1197c5
f60ea166b55974c2ff6893abf3df6d3f
18de6ef74565ac4f3c87bb4f73015f7f
09ffaadbd01675083cba9e89b8629ddb
f110f5edae2e51fbd45372f21d036eff
c31ecb1987f175df483de9013f301182
656eca37dbc0abc52c6859e775cb6ff8
8d56ac3144eb399613dcd15f945ce4e3
41858809fc38f8187834611593a44b4f

URLs

URL IP
hxxp://sstatic1.histats.com/0.gif?2990802&101 208.43.241.179
hxxp://softwarepartnerships.com/downloads/consumerinput.exe 54.84.142.154
hxxp://e6845.ce.akamaiedge.net/pca3-g5.crl
hxxp://e6845.ce.akamaiedge.net/sv.crl
hxxp://e6845.ce.akamaiedge.net/ThawteTimestampingCA.crl
hxxp://e6845.ce.akamaiedge.net/tss-ca-g2.crl
hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootseq.txt
hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootstl.cab
hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt
hxxp://s1.symcb.com/pca3-g5.crl 23.43.133.163
hxxp://crl.thawte.com/ThawteTimestampingCA.crl 23.43.133.163
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt 212.30.134.183
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab 212.30.134.183
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt 212.30.134.183
hxxp://ts-crl.ws.symantec.com/tss-ca-g2.crl 23.43.133.163
hxxp://sv.symcb.com/sv.crl 23.43.133.163
update.consumerinput.com 199.168.174.152
dcs-files.consumerinput.com 23.65.116.97
sddcs.consumerinput.com 162.216.41.16


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers

Traffic

GET /tss-ca-g2.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: ts-crl.ws.symantec.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Server: Apache
ETag: "68dc71308ca0919fd1db48a795e04d21:1443993104"
Last-Modified: Sun, 04 Oct 2015 21:11:44 GMT
Date: Sun, 04 Oct 2015 23:04:51 GMT
Content-Length: 477
Connection: keep-alive
Content-Type: application/pkix-crl
0...0.....0...*.H........0^1.0...U....US1.0...U....Symantec Corporatio
n100...U...'Symantec Time Stamping Services CA - G2..151004210116Z..15
1014210116Z.00.0...U.#..0..._..n\..t...}.?..L...0...U.......c0...*.H..
................[..i/....(.GuK.L.C.....o..S...........8..N.../$._..@.(
%....{..M...P.3....S\..GxPd..4..N3...........,.d]..9-$.C/..Q...{..J...
xW.T...].T.xx..n.ZJ.}......BVK....eh.G....~.....|D.....wG..~E....)..y.
<.P........ aoH,`R......\......g.'..=$0g|._..&.}....d.<..HTTP/1.
1 200 OK..Server: Apache..ETag: "68dc71308ca0919fd1db48a795e04d21:1443
993104"..Last-Modified: Sun, 04 Oct 2015 21:11:44 GMT..Date: Sun, 04 O
ct 2015 23:04:51 GMT..Content-Length: 477..Connection: keep-alive..Con
tent-Type: application/pkix-crl..0...0.....0...*.H........0^1.0...U...
.US1.0...U....Symantec Corporation100...U...'Symantec Time Stamping Se
rvices CA - G2..151004210116Z..151014210116Z.00.0...U.#..0..._..n\..t.
..}.?..L...0...U.......c0...*.H..................[..i/....(.GuK.L.C...
..o..S...........8..N.../$._..@.(%....{..M...P.3....S\..GxPd..4..N3...
........,.d]..9-$.C/..Q...{..J...xW.T...].T.xx..n.ZJ.}......BVK....eh.
G....~.....|D.....wG..~E....)..y.<.P........ aoH,`R......\......g.'
..=$0g|._..&.}....d.<....


GET /pca3-g5.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: s1.symcb.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Server: Apache
ETag: "2235a72ff18d351e39c5c63221752775:1442874344"
Last-Modified: Mon, 21 Sep 2015 22:25:43 GMT
Date: Sun, 04 Oct 2015 23:04:50 GMT
Content-Length: 533
Connection: keep-alive
Content-Type: application/pkix-crl
0...0..0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U
....VeriSign Trust Network1:08..U...1(c) 2006 VeriSign, Inc. - For aut
horized use only1E0C..U...<VeriSign Class 3 Public Primary Certific
ation Authority - G5..150917000000Z..151231235959Z0...*.H.............
...v'....{....."W*<../w...Bj.....H......ll..%..Y&.HtQ...}...F.{>
..3.[..z.H...W../.3.Y.C.t....S{^.A.....G...^...YI.[..N.y..........p...
..;....x6z..i7..0...lS$..h.#.9%[.,.1..1....3.....h;<...........W%..
..doi~..e6G........w........{c..............j.Em.....i.HTTP/1.1 200 OK
..Server: Apache..ETag: "2235a72ff18d351e39c5c63221752775:1442874344".
.Last-Modified: Mon, 21 Sep 2015 22:25:43 GMT..Date: Sun, 04 Oct 2015
23:04:50 GMT..Content-Length: 533..Connection: keep-alive..Content-Typ
e: application/pkix-crl..0...0..0...*.H........0..1.0...U....US1.0...U
....VeriSign, Inc.1.0...U....VeriSign Trust Network1:08..U...1(c) 2006
VeriSign, Inc. - For authorized use only1E0C..U...<VeriSign Class
3 Public Primary Certification Authority - G5..150917000000Z..15123123
5959Z0...*.H................v'....{....."W*<../w...Bj.....H......ll
..%..Y&.HtQ...}...F.{>..3.[..z.H...W../.3.Y.C.t....S{^.A.....G...^.
..YI.[..N.y..........p.....;....x6z..i7..0...lS$..h.#.9%[.,.1..1....3.
....h;<...........W%....doi~..e6G........w........{c..............j
.Em.....i...

<<< skipped >>>

GET /0.gif?2990802&101 HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: sstatic1.histats.com
Connection: Keep-Alive
Cache-Control: no-cache


HTTP/1.1 200 OK
Date: Sun, 04 Oct 2015 23:04:30 GMT
Content-Type: image/gif
Content-Length: 43
Connection: close
Set-Cookie: CountUid=8af0dd81-6dav-4247-99a1-2e1ce148164f; domain=.histats.com; Max-Age=31536000; Expires=Mon, 03-Oct-2016 23:04:30 GMT
GIF89a.............!.......,...........D..;..


GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: text/plain
Last-Modified: Thu, 20 Aug 2015 18:11:19 GMT
Accept-Ranges: bytes
ETag: "803dac9c73dbd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 18
Date: Sun, 04 Oct 2015 23:04:54 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
1401D0DB739CEE64E9....



GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1

Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: application/octet-stream
Last-Modified: Thu, 20 Aug 2015 19:08:01 GMT
Accept-Ranges: bytes
ETag: "803e6c887bdbd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 50006
Date: Sun, 04 Oct 2015 23:04:54 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
MSCF....V.......,...................I..................G.` .authroot.s
tl.W....8..CK...<T.....c.5(..=..!Ev"..d'..c-iTBWI.H%..V.........E.%
)...f....uo...~/.3..s..y>...=..l...dbUH4M...1....&J.}<...#.L..\.
x!F.t.^......q..l8p.i.J'3.........J.5v....z-...A4U.T.E...h...}$.....5.
=.....VnU..E.[.[a(.."..G..P..k.m.3.....EP>.g..?.kY|..L.v...qDz...T.
&p.&..:.f....T.b..\...Af\..J..I.....tN09.......|,[r._..x..Y.e.(d..o...
`3........(... .$...V..e.y.s$p...u...........W..~...A.B....GoOV.....JT
.."VF.<.A....3...r.......addf`.....ph.J:r.E..[\L.X.:....?.. .....b.
..l....St...U.N;..a.h-W....4.Uqb.MbF=.X.C..DX..............V.U..P.....
'[email protected]:...5..j7[.!Yb|.....l...G.
F.E..?lg..m-n.(/6I..........._......5........n.t.<.'....Nim..;.!{..
......N.h...u.....x`... gR..B..V{.'..=}..=|.hg.9.6....j..w.[P`.G.....d
..............!..t./..........*.@(8(v1....'..Z. ....R.r....1Jn.j.[p..A
t..W;F.(..a...N...X....=.[..'.r.....^$B.a...9....,v-...%.2...:...[..6.
j...1..!{.....n..={.U....%...y,.....>a`..0..6..SJda.)9x...zqc..X..V
q.1z.....'^.....^sU|$.u...~.Lgf...Y...V..(f.(...m...-..-&,..c&z...-...
..fGO..6...N.y<.z..,...g|.....!..$....<....q......q8.<t.k.p.=
......z.}.Q.U....&J..-T......[...........}u...T.......>.y.e..CF".VX
$;&T.>..].3.H....7k..w.m...(..#[email protected]....[..l..w.e.2..3..(y. ...
|K9>...o..Uz.....V..W|.k.|...,..V.xPmV...X......!.........Jj.%.N_.9
T.~...v...C.!.4.5a.!...(..../[email protected]....
......D~...%y.....i....a.$vu.7...{.6.{Y3....5.YD.d>,.....b...H.

<<< skipped >>>

GET /msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt HTTP/1.1

Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Content-Type: application/x-x509-ca-cert
Last-Modified: Thu, 23 Jul 2015 23:16:35 GMT
Accept-Ranges: bytes
ETag: "80b4b9e9dc5d01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 958
Date: Sun, 04 Oct 2015 23:04:54 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
0...0..................&..0...*.H........0L1 0...U....GlobalSign Root 
CA - R21.0...U....GlobalSign1.0...U....GlobalSign0...061215080000Z..21
1215080000Z0L1 0...U....GlobalSign Root CA - R21.0...U....GlobalSign1.
0...U....GlobalSign0.."0...*.H.............0..........$...o(.EB..>!
T.....p......_.....0\....{...`......S..{~s..R.{J..I.^...Z..z........%.
.J.*./..w.....|.....:,.....Y}...._^Ij.9^.4..x....l..K..}.yM..-.!..l[}.
.).....I.$b. ........'. s.........../..M..6...z..m.a..\....Q..Z.......
.`..._.r.`.^...J.?....!................0..0...U...........0...U.......
0....0...U.........Wg...j..Y..-.....06..U.../0-0 .).'.%hXXp://crl.glob
alsign.net/root-r2.crl0...U.#..0......Wg...j..Y..-.....0...*.H........
.......S..h.....J.D....'O....Cx.....,<na.MK)....&.....bE......3K...
...N..q4..T.F?..*.mT".:b. o.)......\.>.[A...dC-..9...........E.-...
-.tVI...O..nDx9..~..y....o....5.]...m..DmyF1~........n .P._.M........A
jsS..P.n%..L...R..i.........I..... x.`..%@[email protected]/1.1 200
OK..Content-Type: application/x-x509-ca-cert..Last-Modified: Thu, 23 J
ul 2015 23:16:35 GMT..Accept-Ranges: bytes..ETag: "80b4b9e9dc5d01:0"..
Server: Microsoft-IIS/7.5..X-Powered-By: ASP.NET..Content-Length: 958.
.Date: Sun, 04 Oct 2015 23:04:54 GMT..Connection: keep-alive..X-CCC: R
U..X-CID: 2..0...0..................&..0...*.H........0L1 0...U....Glo
balSign Root CA - R21.0...U....GlobalSign1.0...U....GlobalSign0...0612
15080000Z..211215080000Z0L1 0...U....GlobalSign Root CA - R21.0...U...
.GlobalSign1.0...U....GlobalSign0.."0...*.H.............0.........

<<< skipped >>>

GET /sv.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: sv.symcb.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Server: Apache
ETag: "90ac8691198ababc83c7ad7d14cb8550:1443993088"
Last-Modified: Sun, 04 Oct 2015 21:11:28 GMT
Date: Sun, 04 Oct 2015 23:04:50 GMT
Content-Length: 14653
Connection: keep-alive
Content-Type: application/pkix-crl
0.990.8!...0...*.H........0.1.0...U....US1.0...U....Symantec Corporati
on1.0...U....Symantec Trust Network100...U...'Symantec Class 3 SHA256
Code Signing CA..151004210111Z..151018210111Z0.7:0!...M.h .{m.&...C...
.150827201412Z0!...\..N.....F.E..*..150818144018Z0!...o. .z..%5.O.W...
.150306094921Z0!....~_..N.W..f.1....150309185437Z0!.......w.....-Z....
.150925144610Z0!......)-.5....Y.....150420152841Z0!.... ...E...H] ....
.150324162430Z0!...A5.j..F.e....o4..150717171629Z0!...}I...jR.y.....x.
.150708140159Z0!....!..m.?.AN.......150623233015Z0!...........m.......
.150427234712Z0!..../G..g.......x...150306012430Z0!..........y..n"%.\.
.150615101331Z0!....a....D.....tB...150804133623Z0!...i....U..a:...Ll.
.150112095207Z0!....!........Z..A...150505104631Z0!...As.......l..O...
.150520202423Z0!...v.~3} ......;....150907144307Z0!...............h.A.
[email protected]!...:y;[email protected]|3[,..
.150505010404Z0!...SM!.l."N.g..._}..150827201412Z0!.......12u..L...UU.
.150721021023Z0!.......".pO<........150309205556Z0!....s.T..B...*o.
....150213062833Z0!...YS?.]0.d.........150609150329Z0!.....J....m.x...
@...150209140201Z0!...5]....j.|)E.X0...150902053730Z0!...U..p. p...Z..
.3..150319052518Z0!...V.:..S.).........150318160151Z0!...e.Q.....5]A..
....141021211828Z0!.....dG..eh;.&09....150327074549Z0!...i].......?I.8
....150727191342Z0!..........<I.&..0...150602181147Z0!....:..O.....
J...`..150528174007Z0!..........%aO....=..150206171204Z0!...1..^K.. a&
lt;E......140820001209Z0!.....F..n... n6.zr..150717171104Z0!......

<<< skipped >>>

GET /downloads/consumerinput.exe HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: softwarepartnerships.com
Connection: Keep-Alive
Cache-Control: no-cache


HTTP/1.1 200 OK
Date: Sun, 04 Oct 2015 23:04:31 GMT
Server: Apache
Last-Modified: Tue, 22 Sep 2015 01:28:43 GMT
ETag: "215c6-1d3960-5204beb26dd9d"
Accept-Ranges: bytes
Content-Length: 1915232
Cache-Control: max-age=10, s-maxage=10, private, no-cache, no-store, must-revalidate, proxy-revalidate
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/octet-stream
MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8
...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8.......
.PE..L...b|.N.................t...z...B...8............@..............
.........................@.................................@..........
.X}..........@!.. ....`...............................................
........................................text....r.......t.............
..... ..`.rdata..n .......,...x..............@[email protected].... ...........
...............@....ndata...................................rsrc...X}.
......~..................@[email protected][email protected].
......................................................................
......................................................................
......................................................................
......................................................................
...............................................U....\.}..t .}.F.E.u..H
[email protected][email protected]...
..@..}[email protected]... M..........M........E...FQ.....NU
..M.......M...VT..U........FP..E...............E.P.M...H.@..E..P.E..E.
[email protected]}[email protected].}.j.W.E......E.....
[email protected][email protected][email protected] [email protected].
u.....@._^3.[.....L$....G...i. @...T.....tUVW.q.3.;5..G.sD..i. @...D..
S.....t.G.....t...O..t .....u...3....3...F. @..;5..G.r.[_^...U..QQ

<<< skipped >>>

GET /ThawteTimestampingCA.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: crl.thawte.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Server: Apache
ETag: "7a03192e8eb5e46cf6e2dde73da12dc9:1443077122"
Last-Modified: Thu, 24 Sep 2015 06:45:22 GMT
Date: Sun, 04 Oct 2015 23:04:50 GMT
Content-Length: 341
Connection: keep-alive
Content-Type: application/pkix-crl
0..Q0..0...*.H........0..1.0...U....ZA1.0...U....Western Cape1.0...U..
..Durbanville1.0...U....Thawte1.0...U....Thawte Certification1.0...U..
..Thawte Timestamping CA..150917000000Z..151231235959Z0...*.H.........
...,gx*..)..Z.1.g5.%N...<.,:[email protected].[.$.T$......}....N.....c^
...g...G.$...\N .......$.V|(...-.S.y:v..I....\..1*X.;........U\.HTTP/1
.1 200 OK..Server: Apache..ETag: "7a03192e8eb5e46cf6e2dde73da12dc9:144
3077122"..Last-Modified: Thu, 24 Sep 2015 06:45:22 GMT..Date: Sun, 04
Oct 2015 23:04:50 GMT..Content-Length: 341..Connection: keep-alive..Co
ntent-Type: application/pkix-crl..0..Q0..0...*.H........0..1.0...U....
ZA1.0...U....Western Cape1.0...U....Durbanville1.0...U....Thawte1.0...
U....Thawte Certification1.0...U....Thawte Timestamping CA..1509170000
00Z..151231235959Z0...*.H............,gx*..)..Z.1.g5.%N...<.,:.U@..
..EVM..K.[.$.T$......}....N.....c^...g...G.$...\N .......$.V|(...-.S.y
:v..I....\..1*X.;........U\...


GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: text/plain
Last-Modified: Thu, 20 Aug 2015 18:11:19 GMT
Accept-Ranges: bytes
ETag: "803dac9c73dbd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 18
Date: Sun, 04 Oct 2015 23:04:54 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
1401D0DB739CEE64E9....



GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1

Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: application/octet-stream
Last-Modified: Thu, 20 Aug 2015 19:08:01 GMT
Accept-Ranges: bytes
ETag: "803e6c887bdbd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 50006
Date: Sun, 04 Oct 2015 23:04:54 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
MSCF....V.......,...................I..................G.` .authroot.s
tl.W....8..CK...<T.....c.5(..=..!Ev"..d'..c-iTBWI.H%..V.........E.%
)...f....uo...~/.3..s..y>...=..l...dbUH4M...1....&J.}<...#.L..\.
x!F.t.^......q..l8p.i.J'3.........J.5v....z-...A4U.T.E...h...}$.....5.
=.....VnU..E.[.[a(.."..G..P..k.m.3.....EP>.g..?.kY|..L.v...qDz...T.
&p.&..:.f....T.b..\...Af\..J..I.....tN09.......|,[r._..x..Y.e.(d..o...
`3........(... .$...V..e.y.s$p...u...........W..~...A.B....GoOV.....JT
.."VF.<.A....3...r.......addf`.....ph.J:r.E..[\L.X.:....?.. .....b.
..l....St...U.N;..a.h-W....4.Uqb.MbF=.X.C..DX..............V.U..P.....
'[email protected]:...5..j7[.!Yb|.....l...G.
F.E..?lg..m-n.(/6I..........._......5........n.t.<.'....Nim..;.!{..
......N.h...u.....x`... gR..B..V{.'..=}..=|.hg.9.6....j..w.[P`.G.....d
..............!..t./..........*.@(8(v1....'..Z. ....R.r....1Jn.j.[p..A
t..W;F.(..a...N...X....=.[..'.r.....^$B.a...9....,v-...%.2...:...[..6.
j...1..!{.....n..={.U....%...y,.....>a`..0..6..SJda.)9x...zqc..X..V
q.1z.....'^.....^sU|$.u...~.Lgf...Y...V..(f.(...m...-..-&,..c&z...-...
..fGO..6...N.y<.z..,...g|.....!..$....<....q......q8.<t.k.p.=
......z.}.Q.U....&J..-T......[...........}u...T.......>.y.e..CF".VX
$;&T.>..].3.H....7k..w.m...(..#[email protected]....[..l..w.e.2..3..(y. ...
|K9>...o..Uz.....V..W|.k.|...,..V.xPmV...X......!.........Jj.%.N_.9
T.~...v...C.!.4.5a.!...(..../[email protected]....
......D~...%y.....i....a.$vu.7...{.6.{Y3....5.YD.d>,.....b...H.

<<< skipped >>>

The Trojan connects to the servers at the folowing location(s):

dca-monitoring.exe_2100:

.text
`.rdata
@.data
.rsrc
@.reloc
<A.tH
<9%u3
t8It.IIt#
.CGy,
\$()\$(3
FTPj
uIu
X.jcW
f;F.sj
F.CY;
t.SSSj
f;C.sV
|%f;M
.6.78.9:;
B.CDEFFG
xSSSh
FTPjKS
FtPj;S
C.PjRV
Visual C   CRT: Not enough memory to complete call to strerror.
portuguese-brazilian
Broken pipe
Inappropriate I/O control operation
Operation not permitted
operator
GetProcessWindowStation
3.8.10.1
SQLite format 3
CREATE TABLE sqlite_master(
sql text
CREATE TEMP TABLE sqlite_temp_master(
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYWITHOUTERELEASEATTACHAVINGROUPDATEBEGINNERECURSIVEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTRIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLY
()$^.* ?[]|\-{},:=!
RegOpenKeyTransactedW
RegCreateKeyTransactedW
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.panelID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.userID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.machineID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.version'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.version'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.installTime'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.installType'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.disablePostInstall'
large file support is disabled
unknown operation
SQL logic error or missing database
foreign_keys
foreign_key_list
foreign_key_check
defer_foreign_keys
sqlite_compileoption_get
sqlite_compileoption_used
sqlite_log
sqlite_source_id
sqlite_version
sqlite_attach
sqlite_detach
sqlite_stat4
sqlite_stat3
sqlite_stat1
sqlite_rename_parent
sqlite_rename_trigger
sqlite_rename_table
FOREIGN KEY
GetProcessHeap
RowKey
SQLITE_
d-d-d d:d:d
d:d:d
d-d-d
failed to allocate %u bytes of memory
failed memory resize %u to %u bytes
922337203685477580
API call with %s database connection pointer
os_win.c:%d: (%lu) %s(%s) - %s
delayed %dms for lock/sharing conflict at line %d
%s-shm
%s%c%s
recovered %d pages from %s
recovered %d frames from WAL file %s
cannot limit WAL size: %s
invalid page number %d
2nd reference to page %d
Failed to read ptrmap key=%d
Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)
%d of %d pages missing from overflow list starting at %d
failed to get page %d
freelist leaf count too big on page %d
Page %d:
unable to get the page. error code=%d
btreeInitPage() returns error code %d
On tree page %d cell %d:
On page %d at right child:
Corruption detected in cell %d on page %d
Multiple uses for byte %u of page %d
Fragmentation of %d bytes reported as %d on page %d
Page %d is never used
Pointer map page %d is referenced
Outstanding page count goes from %d to %d during this analysis
unknown database %s
%s(%d)
%s-mjXXXXXX9XXz
MJ delete: %s
MJ collide: %s
-mjX9X
FOREIGN KEY constraint failed
unable to use function %s in the requested context
bind on a busy prepared statement: [%s]
zeroblob(%d)
abort at %d in [%s]: %s
%s constraint failed: %s
%s constraint failed
cannot open savepoint - SQL statements in progress
no such savepoint: %s
cannot release savepoint - SQL statements in progress
cannot commit transaction - SQL statements in progress
sqlite_temp_master
sqlite_master
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
cannot change %s wal mode from within a transaction
database table is locked: %s
statement aborts at %d: [%s] %s
cannot open value of type %s
cannot open virtual table: %s
cannot open table without rowid: %s
cannot open view: %s
no such column: "%s"
foreign key
indexed
cannot open %s column for writing
misuse of aliased aggregate %s
%s: %s.%s.%s
%s: %s.%s
%s: %s
%s prohibited in partial index WHERE clauses
%s prohibited in CHECK constraints
not authorized to use function: %s
%r %s BY term out of range - should be between 1 and %d
too many terms in %s BY clause
Expression tree is too large (maximum depth %d)
variable number must be between ?1 and ?%d
too many SQL variables
too many columns in %s
EXECUTE %s%s SUBQUERY %d
hex literal too big: %s
misuse of aggregate: %s()
%.*s"%w"%s
%s%.*s"%w"
%s OR name=%Q
type='trigger' AND (%s)
sqlite_
table %s may not be altered
there is already another table or index with this name: %s
view %s may not be altered
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
sqlite_sequence
UPDATE "%w".sqlite_sequence set name = %Q WHERE name = %Q
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Cannot add a PRIMARY KEY column
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
sqlite_altertab_%s
CREATE TABLE %Q.%s(%s)
DELETE FROM %Q.%s WHERE %s=%Q
SELECT tbl,idx,stat FROM %Q.sqlite_stat1
too many attached databases - max %d
database %s is already in use
unable to open database: %s
no such database: %s
cannot detach database %s
database %s is locked
%s %T cannot reference objects in database %s
%s cannot use variables
access to %s.%s.%s is prohibited
access to %s.%s is prohibited
object name reserved for internal use: %s
there is already an index named %s
too many columns on %s
duplicate column name: %s
default value of column [%s] is not constant
table "%s" has more than one primary key
AUTOINCREMENT is only allowed on an INTEGER PRIMARY KEY
PRIMARY KEY missing on table %s
CREATE %s %.*s
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
CREATE TABLE %Q.sqlite_sequence(name,seq)
view %s is circularly defined
UPDATE %Q.%s SET rootpage=%d WHERE #%d AND rootpage=#%d
sqlite_stat%d
DELETE FROM %Q.sqlite_sequence WHERE name=%Q
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
sqlite_stat
table %s may not be dropped
use DROP TABLE to delete table %s
use DROP VIEW to delete view %s
foreign key on %s should reference only one column of table %T
number of columns in foreign key does not match the number of columns in the referenced table
unknown column "%s" in foreign key definition
cannot create a TEMP index on non-TEMP table "%s"
table %s may not be indexed
views may not be indexed
virtual tables may not be indexed
there is already a table named %s
index %s already exists
sqlite_autoindex_%s_%d
table %s has no column named %s
CREATE%s INDEX %.*s
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
no such index: %S
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
a JOIN clause is required before %s
%s.%s
%s.rowid
unable to identify the object to be reindexed
duplicate WITH table name: %s
no such collation sequence: %s
table %s may not be modified
cannot modify %s because it is a view
foreign key mismatch - "%w" referencing "%w"
table %S has no column named %s
table %S has %d columns but %d values were supplied
%d values for %d columns
sqlite3_extension_init
unable to open shared library [%s]
sqlite3_
no entry point [%s] in shared library [%s]
error during initialization: %s
automatic extension loading failed: %s
*** in database %s ***
NULL value in %s.%s
unsupported encoding: %s
malformed database schema (%s)
%s - %s
unsupported file format
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
database schema is locked: %s
unknown or unsupported join type: %T %T%s%T
RIGHT and FULL OUTER JOINs are not currently supported
a NATURAL join may not have an ON or USING clause
cannot have both ON and USING clauses in the same join
cannot join using column %s - column not present in both tables
USE TEMP B-TREE FOR %s
COMPOUND SUBQUERIES %d AND %d %s(%s)
column%d
%s:%d
SELECTs to the left and right of %s do not have the same number of result columns
ORDER BY clause should come after %s not before
LIMIT clause should come after %s not before
no such index: %s
multiple references to recursive table: %s
circular reference: %s
table %s has %d values for %d columns
multiple recursive references: %s
recursive reference in a subquery: %s
sqlite_sq_%p
too many references to "%s": max 65535
%s.%s.%s
no such table: %s
SCAN TABLE %s%s%s
sqlite3_get_table() called with two or more incompatible queries
cannot create %s trigger on view: %S
cannot create INSTEAD OF trigger on table: %S
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')
no such trigger: %S
-- TRIGGER %s
no such column: %s
cannot VACUUM - SQL statements in progress
PRAGMA vacuum_db.synchronous=OFF
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
vtable constructor called recursively: %s
vtable constructor failed: %s
vtable constructor did not declare schema: %s
no such module: %s
automatic index on %s(%s)
table %s: xBestIndex returned an invalid plan
ANY(%s)
SUBQUERY %d
TABLE %s
AS %s
PRIMARY KEY
COVERING INDEX %s
INDEX %s
USING INTEGER PRIMARY KEY
VIRTUAL TABLE INDEX %d:%s
%s.xBestIndex() malfunction
at most %d tables in a join
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
unknown database: %s
no such %s mode: %s
%s mode not allowed: %s
no such vfs: %s
database corruption at line %d of [%.10s]
misuse at line %d of [%.10s]
cannot open file at line %d of [%.10s]
no such table column: %s.%s
D:\jenkins\workspace\MT\dca-monitoring\main\dist\Release\dca-monitoring.pdb
InternetCrackUrlW
WinHttpOpenRequest
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpConnect
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
urlmon.dll
WININET.dll
WinHttpCloseHandle
WINHTTP.dll
WinHttpQueryHeaders
NETAPI32.dll
CRYPT32.dll
VERSION.dll
CreatePipe
KERNEL32.dll
EnumWindows
USER32.dll
GDI32.dll
RegOpenKeyW
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyExW
RegNotifyChangeKeyValue
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
ole32.dll
OLEAUT32.dll
SHDeleteKeyW
SHLWAPI.dll
GetCPInfo
zcÁ
.?AVIExecutorTask@@
.?AV?$sp_counted_impl_p@VCChromeActivationCondition@@@detail@boost@@
.?AVCChromeActivationCondition@@
.?AV?$sp_counted_impl_p@VCChromeActivationMethod@@@detail@boost@@
.?AVCChromeActivationMethod@@
.?AV?$bind_t@_NV?$mf3@_NVCChromeActivationMethod@@PAKV?$CComPtr@UIUIAutomationElement@@@ATL@@AAV23@@_mfi@boost@@V?$list4@V?$value@PAVCChromeActivationMethod@@@_bi@boost@@U?$arg@$00@3@V?$value@V?$CComPtr@UIUIAutomationElement@@@ATL@@@23@V?$reference_wrapper@V?$CComPtr@UIUIAutomationElement@@@ATL@@@3@@_bi@3@@_bi@boost@@
.?AV?$bind_t@_NV?$mf2@_NVCChromeActivationMethod@@PAKV?$CComPtr@UIUIAutomationElement@@@ATL@@@_mfi@boost@@V?$list3@V?$value@PAVCChromeActivationMethod@@@_bi@boost@@U?$arg@$00@3@V?$value@V?$CComPtr@UIUIAutomationElement@@@ATL@@@23@@_bi@3@@_bi@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxSilentActivationMethod@@@detail@boost@@
.?AVCFirefoxSilentActivationMethod@@
.?AV?$sp_counted_impl_p@VCChromeExtensionManager@@@detail@boost@@
.?AVCChromeExtensionManager@@
.?AV?$sp_counted_impl_p@VCFirefoxExtensionManager@@@detail@boost@@
.?AVCFirefoxExtensionManager@@
.?AV?$sp_counted_impl_p@VCHttpHeaders@Http@@@detail@boost@@
.?AVIHttpRequestFactory@@
.?AVCAbstractHttpRequestFactory@@
.?AVCHttpRequestExecutorTask@@
.?AV?$sp_counted_impl_p@VCHttpRequestProvider@@@detail@boost@@
.?AVCHttpRequestProvider@@
.?AV?$sp_counted_impl_p@VCHttpRequestSender@@@detail@boost@@
.?AVIHttpFactory@@
.?AVIExecutorFactory@@
.?AVCHttpRequestSender@@
.?AV?$CAtlExeModuleT@VCModule@@@ATL@@
.?AVIHttpRequestListener@@
.?AVCIeDailyStatusReporterTask@@
.?AV?$_IDispEventLocator@$0IDH@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B@ATL@@
.?AV?$IDispEventSimpleImpl@$0IDH@V?$CUserPromptDialog@$0HNB@$0IDH@@@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B@ATL@@
.?AV?$IDispEventImpl@$0IDH@V?$CUserPromptDialog@$0HNB@$0IDH@@@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B$1?LIBID_SHDocVw@@3U3@B$00$00VCComTypeInfoHolder@ATL@@@ATL@@
.?AV?$sp_counted_impl_p@VCWebInstallService@@@detail@boost@@
.?AVCWebInstallService@@
.?AVCExecutorTaskContext@@
.?AVIExecutorLifecycleListener@@
.?AV?$sp_counted_impl_p@V?$vector@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$allocator@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxStartStopComponent@@@detail@boost@@
.?AVCFirefoxStartStopComponent@@
.?AV?$sp_counted_impl_p@UUrlComponents@Http@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeProfileFactory@@@detail@boost@@
.?AVCChromeProfileFactory@@
.?AV?$sp_counted_impl_p@VCFirefoxProfileFactory@@@detail@boost@@
.?AVCFirefoxProfileFactory@@
.?AV?$sp_counted_impl_p@VCHttpUrl@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpRequestData@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCDefaultHttpResultPolicy@@@detail@boost@@
.?AVCDefaultHttpResultPolicy@@
.?AVIHttpResultPolicy@@
.?AV?$sp_counted_impl_p@VCHttpRetryRequest@@@detail@boost@@
.?AVCHttpRetryRequest@@
.?AVIHttpRequest@@
.?AV?$sp_counted_impl_p@VCAsyncHttpSession@@@detail@boost@@
.?AVCExecutorComInitializer@@
.?AVIHttpSession@@
.?AVCAbstractHttpSession@@
.?AVCAsyncHttpSession@@
.?AVCAbstractExecutorTask@@
.?AV?$sp_counted_impl_p@VCWinHttpWrapper@@@detail@boost@@
.?AVCWinHttpWrapper@@
.?AVIHttpWrapper@@
.?AV?$sp_counted_impl_p@VCExecutor@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCSQLiteDB@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCMultiExecutor@@@detail@boost@@
.?AVCMultiExecutor@@
.?AVIExecutor@@
.?AV?$sp_counted_impl_p@VCHttpResponse@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCLocalizationSupport@@@detail@boost@@
.?AVCLocalizationSupport@@
.?AVILocalizationSupport@@
.?AV?$sp_counted_impl_p@V?$map@_WV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@U?$less@_W@std@@V?$allocator@U?$pair@$$CB_WV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@@4@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCRegKey@ATL@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeProfileManager@@@detail@boost@@
.?AVCChromeProfileManager@@
.?AV?$sp_counted_impl_p@VCChromeCookieReader@@@detail@boost@@
.?AVCChromeCookieReader@@
.?AV?$sp_counted_impl_p@VCChromeProfilePreferences@@@detail@boost@@
.?AVCChromeProfilePreferences@@
.?AV?$sp_counted_impl_p@VCChromeExtensionPreferences@@@detail@boost@@
.?AVCChromeExtensionPreferences@@
.?AV?$sp_counted_impl_p@VCFirefoxProfileManager@@@detail@boost@@
.?AVCFirefoxProfileManager@@
.?AV?$sp_counted_impl_p@VCFirefoxCookieReader@@@detail@boost@@
.?AVCFirefoxCookieReader@@
.?AV?$sp_counted_impl_p@VCFirefoxProfilePreferences@@@detail@boost@@
.?AVCFirefoxProfilePreferences@@
.?AV?$sp_counted_impl_p@VCFirefoxExtensionPreferences@@@detail@boost@@
.?AVCFirefoxExtensionPreferences@@
.?AV?$sp_counted_impl_p@VCHttpRequest@@@detail@boost@@
.?AVIHttpRequestStateListener@@
.?AVIHttpErrorStateListener@@
.?AVIHttpStateListener@@
.?AVIHttpHeaderDataListener@@
.?AVIHttpSessionListener@@
.?AVCHttpRequest@@
.?AV?$sp_counted_impl_p@VIHttpSessionConfigurator@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCExecutorLifecycleListeners@@@detail@boost@@
.?AVIExecutorContext@@
.?AVCExecutor@@
.?AV?$sp_counted_impl_p@VCHttpSessionContext@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpHeaderData@@@detail@boost@@
.?AV?$sp_counted_impl_p@U?$pair@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$shared_ptr@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@boost@@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$shared_ptr@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@boost@@@std@@@6@@std@@@detail@boost@@
.?AVCSQLiteDB@@
.?AVISQLiteDB@@
.?AVCSQLiteException@@
.?AV?$sp_counted_impl_p@VCHttpFileRetriever@@@detail@boost@@
.?AVCHttpFileRetriever@@
.?AVIHttpFileRetriever@@
.?AV?$sp_counted_impl_p@VCRegistryKey@@@detail@boost@@
.?AVCSQLiteQuery@@
.?AVCHttpSessionHandleConfigurator@@
.?AVIHttpSessionConfigurator@@
.?AVCHttpConnectionHandleConfigurator@@
.?AVCHttpRequestHandleConfigurator@@
.?AVCHttpSessionProxyConfigurator@@
.?AVCHttpSessionRequestSender@@
.?AVIHttpSessionProcessor@@
.?AVCHttpSessionResponseReciever@@
.?AVCHttpSessionHeaderDataProcessor@@
.?AVCHttpSessionResponseBodyProcessor@@
.?AVCCyclicControl@ExecutorControls@@
.?AVCQueueControl@ExecutorControls@@
.?AVIExecutorControl@@
.?AVCSQLiteTable@@
.?AV?$sp_counted_impl_p@V?$vector@U?$RegistryValue@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@@V?$allocator@U?$RegistryValue@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@@@std@@@std@@@detail@boost@@
012345678
!"#$%&'(
<html xmlns="hXXp://VVV.w3.org/1999/xhtml">
<p><a href="hXXps://VVV.consumerinput.com/">
</a>, <a href="hXXps://VVV.consumerinput.com/privacy_cn">
<p id="paragraph">THANK YOU FOR JOINING CONSUMER INPUT!</p>
<p>The Consumer Input extension is able to identify survey reward opportunities with topics that you would be most likely to qualify for, optimizing your chances to earn rewards!</p>
<p><a href="hXXps://VVV.consumerinput.com/">Learn More</a>, <a href="hXXps://VVV.consumerinput.com/privacy">Privacy Policy</a></p>
<p><a href="hXXps://VVV.consumerinput.com/">Saber m
s</a>, <a href="hXXps://VVV.consumerinput.com/privacy_es">Pol
<p id="paragraph">MERCI DE REJOINDRE CONSUMER INPUT!</p>
<p><a href="hXXps://VVV.consumerinput.com/">En savoir plus</a>, <a href="hXXps://VVV.consumerinput.com/privacy_fr">Charte de confidentialit
</a>, <a href="hXXps://VVV.consumerinput.com/privacy">
<p><a href="hXXps://VVV.consumerinput.com/">Daha fazla bilgi</a>, <a href="hXXps://VVV.consumerinput.com/privacy">Gizlilik Politikas
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
9“9X:^:c:i:s:}:
3?3V3
6;7^7@8]8
3"3)30373
8 8$8(8,8084888
9 9$9(9,90949
4"494\4]5
9%9U:\:r:|:
5"5&5*5.556
?!?%?)?-?1?5?9?
02
7 7$7(7,707
> >$>(>,>0>
0 0$0(0,0
= =$=(=,=
2$2@2`2|2
2$202<2@2
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
mscoree.dll
WUSER32.DLL
CI Chrome Install Notice
"%s" --new-window "%s"
Chrome_RenderWidgetHostHWND
CI Chrome Install Notice: done - Google Chrome
ScrollView::Viewport
@Chrome_WidgetWin_1
Add to Chrome
Consumer Input has been added to Chrome.
?userId=%s&panelId=%s
hXXp://VVV.consumerinput.com/panel/install/thanks/
log.txt
Kuser32.dll
Global\{0DEADC47-D43F-4344-BB79-C87769BEFA87}
Global\{B50E68E0-857A-4E5B-B398-434489C6B3B4}
%s/0/0/%s/0/%s/NOSUBUSERID/0
Software\Microsoft\Windows\Shell\Associations\UrlAssociations
\http\UserChoice\ProgId
\https\UserChoice\ProgId
http\shell\open\command\
We were not able to close %s. Please close all %s windows and dialog boxes and click 'OK' to try again or 'Cancel' to abort uninstallation.
hXXps://sddcs.consumerinput.com/EClick
source=%s&event=%s&info=%s<=%s&cimtMachineID=%s
WEB_INSTALL_PAGE_OPEN
CIMT="%s", DCA="%s", enabled="%s", installType="%s", registeredInOmaha="%s", registeredInBrowser="%s", browser="%s", installTime="%s", activationTime="%s", profile="%s"
DCA="%s", %s="%s"
OS="%s", CIMT="%s", DCA="%s", status="%s"
%s web-install triggered, opening "%s"... profile="%s"
%s: %s set for '%s', profile="%s"
OS="%s", CIMT="%s", Omaha="%s", WinUser="%s", CIMIUninstaller="%s", EPM="%s", defaultBrowser="%s"
IE="%d", metroIE="%d", FF="%d", CR ="%d", metroCR="%d"
IsBhoRegistered="%s", IsEnabledViaPolicy="%s", IsExtensionApproved="%s", IsExtensionDisabled="%s", AutoEnableNewAddons="%s", AllowThirdpartyBrowserExtension="%s", ExtensionStatusChangeDisabled="%s", StatusInAddonList="%s", DenyAllAddons="%s"
lastStatusReportTime
lastCookieReportTime
questionmarket.com
insightexpressai.com
lastLifetimeReportTime
%sLastNotificationDisplayTime
%sDisableNotifications
failed, unsupported browser version
failed, operation has timed out
failed, UI Automation not supported
hXXp://auto.ria.com/search/?target=search&event=little&category_id=1&bodystyle[0]=7&chooseTypeSearchAuto=oldAutos&marka=0&model=0&state=0&s_yers=0&po_yers=0&price_ot=200000&price_do=¤cy=1#bodystyle[0]=7&countpage=10&category_id=1&view_type_id=0&page=0&marka=0&model=0&s_yers=0&po_yers=0&state=0&city=0&price_ot=200000&price_do=¤cy=1&gearbox=0&type=0&drive_type=0&door=0&color=0&metallic=0&engineVolumeFrom=&engineVolumeTo=&raceFrom=&raceTo=&powerFrom=&powerTo=&power_name=1&fuelRateFrom=&fuelRateTo=&fuelRatesType=city&custom=0&damage=0&saledParam=0&under_credit=0&confiscated_car=0&auto_repairs=0&with_exchange=0&with_real_exchange=0&exchangeTypeId=0&with_photo=0&with_video=0&is_hot=0&vip=0&checked_auto_ria=0&top=0&order_by=3&hide_black_list=0&auto_id=&auth=0&deletedAutoSearch=0&user_id=0&scroll_to_auto_id=0&expand_search=0&can_be_checked=0&last_auto_id=0&matched_country=-1&seatsFrom=&seatsTo=&wheelFormulaId=0&axleId=0&carryingTo=&carryingFrom=&search_near_states=0&company_id=0&company_type=0
%s %s
application/x-www-form-urlencoded; charset=UTF-8
@%s;%s
%Y%m%d
{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}
Software\Microsoft\Windows\CurrentVersion\Ext\
Global\Install_%s_{D96CB9E8-13F9-46F9-9320-1CBE7C92AA57}
%s=%s
consumerinput.com
SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Chrome
chrome.exe
\Google\Chrome\User Data\
hXXps://VVV.consumerinput.com/uninstall/chromeweb/?id=faoigfclahgbjjjaopddafnnapmeppnc
To completely uninstall the Consumer Input software, you must remove the Consumer Input extension from your Google Chrome browser.
Please follow the instructions below to remove the Chrome extension:
1. From the Chrome window, click on the customize button (the "wrench" icon or the three horizontal bars in the top right corner of the browser)
profile.info_cache
.%s.name
.%s.active_time
extensions.known_disabled
extensions.settings.%s
.state
.ack_external
.disable_reasons
.from_webstore
Firefox
firefox.exe
MozillaWindowClass
\Mozilla\Firefox\
profiles.ini
extensions.sqlite
extensions.json
prefs.js
extensions.ciff.dca.panelID
extensions.ciff.dca.userID
extensions.ciff.machineID
extensions.ciff.version
extensions.ciff.dca.version
extensions.ciff.dca.installTime
extensions.ciff.dca.installType
extensions.ciff.disablePostInstall
user_pref\("%s", ?"([\w\{\}\.-] )"\);
extensions.ini
cookies.sqlite
iexplore.exe
dcabho.Dca
Software\Microsoft\Windows\CurrentVersion\Policies\Ext
ListBox_Support_CLSID
{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}
{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}
{1138A907-2253-45d6-99C1-843A0AC58730}
{49C47E46-0DD3-4BCD-AF91-A14C104BD9DE}
{C7B061F6-380E-4545-86E3-400E3156FD28}
0.0.0.0
Software\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer
postinstallUrl
hXXps://VVV.consumerinput.com/installprompt/dca/chrome/?panelId=%s
software\mozilla\Mozilla Firefox
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
CKERNEL32.DLL
dwmapi.dll
hXXp://
SOFTWARE\Microsoft\Windows NT\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\App Paths\
Advapi32.dll
$1"%d".$2
C%s_timer
%s_cancelEvent
C%s: %s
CHTTP/1.1
C0xx
Dbghelp.dll
Cres://%s/%d
%s %s.%d (%s).dmp
CSELECT encrypted_value FROM cookies WHERE name = '%s' and host_key = '.%s'
SELECT name, encrypted_value FROM cookies WHERE host_key = '.%s'
\Local Storage\chrome-extension_%s_0.localstorage
(%s)|(%s)
(%s)|(%s)|(%s)
%s_%s
CSELECT value FROM moz_cookies WHERE name = '%s' AND host = '.%s'
SELECT name, value FROM moz_cookies WHERE host = '.%s'
C%s\%s
\StringFileInfo\xx\%s
E%s%scookie-retriever.exe
%s -r %s
%s -a
%s -w %s %s
%s -d %s
%s; expires=%s
CSELECT count(*) FROM addon WHERE id = '%s'
SELECT count(*) FROM addon WHERE id = '%s' AND visible = 1 AND active = 1
SELECT count(*) FROM addon WHERE id = '%s' AND location NOT LIKE '%%winreg-app%%' AND visible = 1
SELECT descriptor FROM addon WHERE id = '%s' AND location LIKE '%%winreg-app%%'
UPDATE addon SET active = 1, userDisabled = 0, appDisabled = 0, softDisabled = 0 WHERE id = '%s' AND location LIKE '%%winreg-app%%'
.%s.id
.active
.visible
.location
.descriptor
.userDisabled
.appDisabled
.softDisabled
sSQLITE_OK
SQLITE_ERROR
SQLITE_INTERNAL
SQLITE_PERM
SQLITE_ABORT
SQLITE_BUSY
SQLITE_LOCKED
SQLITE_NOMEM
SQLITE_READONLY
SQLITE_INTERRUPT
SQLITE_IOERR
SQLITE_CORRUPT
SQLITE_NOTFOUND
SQLITE_FULL
SQLITE_CANTOPEN
SQLITE_PROTOCOL
SQLITE_EMPTY
SQLITE_SCHEMA
SQLITE_TOOBIG
SQLITE_CONSTRAINT
SQLITE_MISMATCH
SQLITE_MISUSE
SQLITE_NOLFS
SQLITE_AUTH
SQLITE_FORMAT
SQLITE_RANGE
SQLITE_ROW
SQLITE_DONE
CPPSQLITE_ERROR
%s[%d]: %s
%Program Files%\Consumer Input\Monitoring\dca-monitoring.exe
{8856F961-340A-11D0-A96B-00C04FD705A2}
9.9.9.9
dca-monitoring.exe
3.2.0.762


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    nsv5.tmp:2012
    dca-host.exe:1088
    nsf8.tmp:928
    schtasks.exe:1068
    schtasks.exe:1880
    ciff-3.2.0-12191.exe:3396
    %original file name%.exe:580
    nsaB.tmp:456
    ConsumerInputUpdate.exe:1852
    ConsumerInputUpdate.exe:1072
    ConsumerInputUpdate.exe:164
    ConsumerInputUpdate.exe:824
    ConsumerInputUpdate.exe:372
    ConsumerInputUpdate.exe:912
    dca-monitoring.exe:2100
    ciie-3.2.0-12413.exe:1560
    cimt-3.2.1-1112.exe:308

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp\UAC.dll (18 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsf8.tmp (26165 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp\System.dll (11 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nse7.tmp\nsis_plugin.dll (22931 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsaB.tmp (16088 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsfA.tmp\UAC.dll (18 bytes)
    %Program Files%\Consumer Input\CIuninstall.exe (23268 bytes)
    %Program Files%\Consumer Input\CIuninstall.ico (26 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp\nsis_plugin.dll (24778 bytes)
    %Program Files%\Consumer Input\Firefox\uninstall.exe (23720 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp\System.dll (11 bytes)
    %Program Files%\Consumer Input\Firefox\ciff-3.2.0-12191.xpi (13701 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr1D.tmp\UAC.dll (18 bytes)
    %Program Files%\Consumer Input\Firefox\uninstall.ico (26 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsz2.tmp (6040 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\0[1].gif (43 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nse4.tmp\inetc.dll (784 bytes)
    %Documents and Settings%\%current user%\Cookies\index.dat (964 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nse3.tmp (43 bytes)
    %Documents and Settings%\%current user%\Cookies\Current_User@histats[1].txt (199 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsv5.tmp (117794 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateHelper.msi (45 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_en.dll (28 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_fr.dll (31 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUTD.tmp (9606 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_de.dll (31 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputCrashHandler.exe (105 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es.dll (31 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdate.exe (105 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psuser.dll (158 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdate.dll (1990 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es-419.dll (29 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_ja.dll (25 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_zh-CN.dll (22 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psmachine.dll (158 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateOnDemand.exe (60 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateBroker.exe (60 bytes)
    %Program Files%\Consumer Input\Update\Download\{1138A907-2253-45D6-99C1-843A0AC58730}\0.0.0.0\ciie-3.2.0-12413.exe (41656 bytes)
    %WinDir%\Temp\Cab19.tmp (50 bytes)
    %System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (50 bytes)
    %System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
    %Program Files%\Consumer Input\Update\Install\{E8858BE5-C8E2-42D0-856A-1E1AC167BFA4}\cimt-3.2.1-1112.exe (15278 bytes)
    %Program Files%\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0\ciff-3.2.0-12191.exe (10815 bytes)
    %WinDir%\Temp\Tar1A.tmp (2712 bytes)
    %System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
    %Program Files%\Consumer Input\Update\Download\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}\0.0.0.0\cimt-3.2.1-1112.exe (15278 bytes)
    %WinDir%\Temp\Tar14.tmp (2712 bytes)
    %WinDir%\Temp\Cab15.tmp (54 bytes)
    %System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
    %Program Files%\Consumer Input\Update\Install\{ADDC1D41-A5C8-4D63-88D1-EEC74D21B769}\ciie-3.2.0-12413.exe (41656 bytes)
    %WinDir%\Temp\Cab13.tmp (54 bytes)
    %WinDir%\Temp\Tar16.tmp (2712 bytes)
    %Program Files%\Consumer Input\Update\Install\{DE282511-3FBA-42AF-9FE1-88D68624AED7}\ciff-3.2.0-12191.exe (10815 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateHelper.msi (45 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_en.dll (28 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll (5873 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\C3E814D1CB223AFCD58214D14C3B7EAB (220 bytes)
    %WinDir%\Tasks\ConsumerInputUpdateTaskMachineUA.job (952 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdate.exe (601 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_ja.dll (25 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\8BD11C4A2318EC8E5A82462092971DEA (477 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\40C68D5626484A90937F0752C8B950AB (533 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_zh-CN.dll (22 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\40C68D5626484A90937F0752C8B950AB (160 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe (60 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe (60 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es-419.dll (29 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\ECF3006D44DA211141391220EE5049F4 (140 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll (673 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputCrashHandler.exe (601 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\C3E814D1CB223AFCD58214D14C3B7EAB (341 bytes)
    %WinDir%\Tasks\ConsumerInputUpdateTaskMachineCore.job (948 bytes)
    %Program Files%\Consumer Input\Update\ConsumerInputUpdate.exe (601 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\ECF3006D44DA211141391220EE5049F4 (14 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\psuser.dll (673 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\8BD11C4A2318EC8E5A82462092971DEA (208 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_de.dll (31 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_fr.dll (31 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es.dll (31 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\Cab11.tmp (54 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\Tar18.tmp (2712 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CabF.tmp (54 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (50 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\Tar12.tmp (2712 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\Tar10.tmp (2712 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\Cab17.tmp (50 bytes)
    %Program Files%\Consumer Input\InternetExplorer\dca-host.exe (27903 bytes)
    %Program Files%\Consumer Input\InternetExplorer\dca.js (18506 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp\UAC.dll (18 bytes)
    %Program Files%\Consumer Input\InternetExplorer\uninstall.log (844 bytes)
    %Program Files%\Consumer Input\InternetExplorer\uninstall.ico (26 bytes)
    %Program Files%\Consumer Input\InternetExplorer\dca-bho.dll (22734 bytes)
    %Program Files%\Consumer Input\InternetExplorer\cookie-retriever.exe (4042 bytes)
    %Program Files%\Consumer Input\InternetExplorer\mozjs185-1.0.dll (47540 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp\System.dll (11 bytes)
    %Program Files%\Consumer Input\InternetExplorer\uninstall.exe (46579 bytes)
    %Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll (19305 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsq20.tmp\nsis_plugin.dll (26100 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\ns25.tmp (6 bytes)
    %Program Files%\Consumer Input\Monitoring\cinm-host.exe (6524 bytes)
    %Program Files%\Consumer Input\Monitoring\uninstall.exe (25018 bytes)
    %Program Files%\Consumer Input\Monitoring\uninstall.ico (26 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\System.dll (11 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\UAC.dll (18 bytes)
    %Program Files%\Consumer Input\Monitoring\manifest.json (726 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\nsExec.dll (6 bytes)
    %Program Files%\Consumer Input\Monitoring\cookie-retriever.exe (4066 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\ns24.tmp (6 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\nsis_plugin.dll (26100 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr23.tmp\KillProcDLL.dll (1568 bytes)
    %Program Files%\Consumer Input\Monitoring\dca-monitoring.exe (25963 bytes)
    %Documents and Settings%\%current user%\Local Settings\Application Data\Consumer Input Monitoring Tool_SID.dat (46 bytes)
    %WinDir%\Tasks\CIMT_S-1-5-21-1844237615-1960408961-1801674531-1003.job (498 bytes)
    %WinDir%\Tasks\CIMT_daily_S-1-5-21-1844237615-1960408961-1801674531-1003.job (464 bytes)

  4. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now