Trojan.Win32.Alureon_d14179896e

by malwarelabrobot on May 6th, 2015 in Malware Descriptions.

Trojan-Downloader.Win32.Genome.qitd (Kaspersky), Trojan.Win32.Alureon.FD, Trojan.Win32.Swrort.3.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: d14179896ecdaeb7d46930ddb3d9e62b
SHA1: 96deb05b51c25e85cc39d21a6295206d0680e521
SHA256: 28554e96f53fb79822eab052b5b957af7719cb93cb9c5ea9cf4675839709ca10
SSDeep: 1536:qpgpHzb9dZVX9fHMvG0D3XJ7CaWVTN1of29o41ahf0:ogXdZt9P6D3XJ7CaE8O9o4sK
Size: 57251 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company:
Created at: 2009-12-06 00:50:52
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

nsb7.tmp:1944
nscA.tmp:1864
ConsumerInputUpdate.exe:1216
ConsumerInputUpdate.exe:600
ConsumerInputUpdate.exe:1600
ConsumerInputUpdate.exe:1968
ConsumerInputUpdate.exe:548
ConsumerInputUpdate.exe:1576
ciff-3.2.0-12099.exe:1328
%original file name%.exe:1360

The Trojan injects its code into the following process(es):

nsc4.tmp:2020

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process nsc4.tmp:2020 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nscA.tmp (16088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso6.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso6.tmp\UAC.dll (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsb7.tmp (28693 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso6.tmp\nsis_plugin.dll (24853 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nso6.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsb7.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsd5.tmp (0 bytes)

The process nsb7.tmp:1944 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Consumer Input\CIuninstall.ico (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsm9.tmp\UAC.dll (18 bytes)
%Program Files%\Consumer Input\CIuninstall.exe (23955 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsw8.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsm9.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsm9.tmp\UAC.dll (0 bytes)

The process nscA.tmp:1864 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdateHelper.msi (45 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdate.exe (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputCrashHandler.exe (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdateBroker.exe (60 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUTC.tmp (9606 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_en.dll (28 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_es-419.dll (29 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_ja.dll (25 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_fr.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_de.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\psmachine.dll (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdate.dll (1990 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\psuser.dll (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdateOnDemand.exe (60 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_zh-CN.dll (22 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_es.dll (31 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp (0 bytes)

The process ConsumerInputUpdate.exe:1216 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%WinDir%\Temp\Tar19.tmp (2712 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (48 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%WinDir%\Temp\Cab14.tmp (54 bytes)
%Program Files%\Consumer Input\Update\Install\{2CFD99BD-E566-4B5A-A6F2-E4574B50882A}\ciff-3.2.0-12099.exe (10177 bytes)
%Program Files%\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0\ciff-3.2.0-12099.exe (10177 bytes)
%WinDir%\Temp\Tar15.tmp (2712 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%WinDir%\Temp\Cab18.tmp (48 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%WinDir%\Temp\Cab12.tmp (54 bytes)
%WinDir%\Temp\Tar13.tmp (2712 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\{0826F015-17F4-4EC3-BA8A-D578637C3112}-ciff-3.2.0-12099.exe (0 bytes)
%WinDir%\Temp\Tar19.tmp (0 bytes)
%Program Files%\Consumer Input\Update\Install (0 bytes)
%WinDir%\Temp\Tar13.tmp (0 bytes)
%WinDir%\Temp\Cab12.tmp (0 bytes)
%WinDir%\Temp\Cab18.tmp (0 bytes)
%WinDir%\Temp\Cab14.tmp (0 bytes)
%WinDir%\Temp\Tar15.tmp (0 bytes)

The process ConsumerInputUpdate.exe:1600 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateHelper.msi (45 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_en.dll (28 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll (5873 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\C3E814D1CB223AFCD58214D14C3B7EAB (220 bytes)
%WinDir%\Tasks\ConsumerInputUpdateTaskMachineUA.job (952 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdate.exe (601 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_ja.dll (25 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\8BD11C4A2318EC8E5A82462092971DEA (477 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\40C68D5626484A90937F0752C8B950AB (533 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_zh-CN.dll (22 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\40C68D5626484A90937F0752C8B950AB (160 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe (60 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe (60 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es-419.dll (29 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\ECF3006D44DA211141391220EE5049F4 (140 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll (673 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputCrashHandler.exe (601 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\C3E814D1CB223AFCD58214D14C3B7EAB (341 bytes)
%WinDir%\Tasks\ConsumerInputUpdateTaskMachineCore.job (948 bytes)
%Program Files%\Consumer Input\Update\ConsumerInputUpdate.exe (601 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\ECF3006D44DA211141391220EE5049F4 (7 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\psuser.dll (673 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\8BD11C4A2318EC8E5A82462092971DEA (208 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_de.dll (31 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_fr.dll (31 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es.dll (31 bytes)

The process ConsumerInputUpdate.exe:548 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CabE.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (48 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab10.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar11.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab16.tmp (48 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar17.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TarF.tmp (2712 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CabE.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab10.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar11.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab16.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar17.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TarF.tmp (0 bytes)

The process ciff-3.2.0-12099.exe:1328 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Consumer Input\Firefox\uninstall.exe (22701 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp\nsis_plugin.dll (20162 bytes)
%Program Files%\Consumer Input\Firefox\uninstall.ico (26 bytes)
%Program Files%\Consumer Input\Firefox\ciff-3.2.0-12099.xpi (10311 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp\UAC.dll (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp\System.dll (11 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsn1B.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp\UAC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp\nsis_plugin.dll (0 bytes)

The process %original file name%.exe:1360 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsx3.tmp (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\inetc.dll (20 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (388 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@histats[1].txt (199 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YDU7W123\0[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsc4.tmp (109915 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsx3.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\inetc.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsc1.tmp (0 bytes)

Registry activity

The process nsc4.tmp:2020 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Common]
"captureType" = "22"
"postinstallUrl" = "1"
"openPostInstallPage" = "0true"

[HKCU\Software\Compete\PartnerData]
"notifyPartner" = "0true"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\ConsumerInput\Common]
"Installed" = "2015.05.05 10:25:55"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"lang" = "en"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Common]
"supresspostinstall" = "0false"
"disableUninstallDlg" = "false"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"client" = "spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\CompeteInc]
"MachineID" = "{8117A787-ACA7-4EF5-B424-28C4FAE01153}"

[HKLM\SOFTWARE\ConsumerInput\Common]
"UserSID" = "S-1-5-21-1844237615-1960408961-1801674531-1003"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\ConsumerInput\Common]
"panelid" = "1spruce000"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"lang" = "en"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKCU\Software\Compete\PartnerData]
"partnerUrl" = "1http://www.moztweak.com/api/postback/?CID=1317&d=1"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"client" = "spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}"

[HKLM\SOFTWARE\ConsumerInput\Common]
"panelistid" = "1SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"lang" = "en"

[HKLM\SOFTWARE\ConsumerInput\Common]
"UserAppDataLocal" = "%Documents and Settings%\%current user%\Local Settings\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\ConsumerInput\Common]
"InstallationType" = "CIMI"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E6 76 95 97 74 B4 6B CE C4 5F EE A3 03 8E B2 5C"

[HKLM\SOFTWARE\ConsumerInput\Common]
"eulaVersion" = "120140910"
"UserAppData" = "%Documents and Settings%\%current user%\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"client" = "spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"Name" = "Consumer Input Firefox Extension"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"Name" = "Consumer Input Internet Explorer Extension"

[HKLM\SOFTWARE\ConsumerInput\Common]
"lang" = "1en"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"Name" = "Consumer Input Monitoring Tool"

The process nsb7.tmp:1944 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4C C0 A9 75 BE 20 AA C2 1C 4F 0A 0B 5C EF A1 7E"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer]
"NoRepair" = "1"
"NoModify" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{0ABC687F-FA5B-481F-879D-EBE9DD6CF8DD}]
"pv" = "3.2.4.4265"
"Name" = "Consumer Input Uninstaller Update"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer]
"DisplayIcon" = "%Program Files%\Consumer Input\CIuninstall.ico"
"Publisher" = "Compete Inc."
"DisplayName" = "Consumer Input (remove only)"
"InstallLocation" = "%Program Files%\Consumer Input"
"UninstallString" = "%Program Files%\Consumer Input\CIuninstall.exe"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{0ABC687F-FA5B-481F-879D-EBE9DD6CF8DD}]
"lang" = "en"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{0ABC687F-FA5B-481F-879D-EBE9DD6CF8DD}]
"client" = "spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}"

The process nscA.tmp:1864 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EB A4 55 BA 7F E2 26 4D 99 E8 7F 5D 48 39 61 2C"

The process ConsumerInputUpdate.exe:1216 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "05 06 DA CC 63 91 65 DF 80 71 DC DA 3E 69 01 D6"

[HKCU\Software\ConsumerInput\Update\proxy]
"source" = "IE"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"InstallTime" = "1430810811"

[HKU\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
"ParseAutoexec" = "1"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"brand" = "GGLS"
"LastCheckSuccess" = "1430810814"
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"pv" = "0.0.0.0"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"client" = "spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}"
"lang" = "en"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"lang" = "en"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"lang" = "en"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"tttoken"

[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerExtraCode1"
"LastInstallerError"
"LastInstallerResultUIString"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerError"

[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerSuccessLaunchCmdLine"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerSuccessLaunchCmdLine"
"LastInstallerExtraCode1"

[HKLM\SOFTWARE\ConsumerInput\Update]
"uid"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"browser"
"UpdateAvailableSince"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"tttoken"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"UpdateAvailableCount"
"iid"
"tttoken"
"ap"
"LastInstallerResult"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientStateMedium\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"eulaaccepted"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"experiment_labels"
"LastInstallerResultUIString"

[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerResult"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"eulaaccepted"

The process ConsumerInputUpdate.exe:600 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\Interface\{4F3440C0-EB6A-46F2-94D8-2D74A0D21C5D}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.CoreMachineClass.1]
"(Default)" = "Google Update Core Class"

[HKCR\Interface\{977ED000-4ECA-454D-AEA2-11824E57A043}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{FFA4D25D-8411-40F8-919D-3C4CD94FBD29}\NumMethods]
"(Default)" = "8"

[HKCR\Interface\{37EB1FA3-2181-4EED-8C9F-363068501901}]
"(Default)" = "IAppBundle"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\Interface\{58AC6DE8-F15B-4C6A-91D7-B8FA6A2F4169}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\ConsumerInputUpdate.Update3WebMachine]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine\CurVer]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachine.1.0"

[HKCR\Interface\{41E3E6E6-3E50-4F6E-A1F8-1E24440BC6F8}]
"(Default)" = "IApp"

[HKCR\Interface\{592DA852-5C4E-49F8-88BC-EA0A893180C6}]
"(Default)" = "ICoCreateAsync"

[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}]
"(Default)" = "ConsumerInputUpdate CredentialDialog"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\Interface\{52C0A3BA-1DE8-477D-91F4-F82D3824C304}]
"(Default)" = "IGoogleUpdate3Web"

[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}\ProgID]
"(Default)" = "ConsumerInputUpdate.ProcessLauncher.1.0"

[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}\InprocHandler32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll"

[HKCR\ConsumerInputUpdate.CoCreateAsync\CLSID]
"(Default)" = "{87A125E5-B663-496F-954E-488A82FAC012}"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\ProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachine.1.0"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\Interface\{5E8F3A92-7544-482D-9D34-FFD702697D16}\NumMethods]
"(Default)" = "10"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachine"

[HKCR\ConsumerInputUpdate.CoCreateAsync\CurVer]
"(Default)" = "ConsumerInputUpdate.CoCreateAsync.1.0"

[HKCR\Interface\{E3B8A2CD-70B5-49A4-BFD6-0180BE487A4C}]
"(Default)" = "IAppVersionWeb"

[HKCR\Interface\{CCE83B2E-3794-41FC-8179-46BFEA22148A}]
"(Default)" = "IGoogleUpdate"

[HKCR\Interface\{2A142934-F3E4-4D68-A360-3FE35783E849}]
"(Default)" = "IJobObserver"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"

[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}]
"(Default)" = "ConsumerInput.OneClickProcessLauncher"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachine"

[HKCR\ConsumerInputUpdate.ProcessLauncher]
"(Default)" = "Google Update Process Launcher Class"

[HKCR\ConsumerInputUpdate.CoreMachineClass\CurVer]
"(Default)" = "ConsumerInputUpdate.CoreMachineClass.1"

[HKCR\ConsumerInputUpdate.CoCreateAsync]
"(Default)" = "CoCreateAsync"

[HKCR\Interface\{FA326D8A-B632-4BCE-858E-12271ABAF613}\NumMethods]
"(Default)" = "10"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}\InprocServer32]
"ThreadingModel" = "Both"

[HKCR\Interface\{5A43377F-504A-4FC4-8575-9C98997788BF}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{0E02C3DE-FDA9-4381-99E6-7ED76A518504}\InProcServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll"

[HKCR\Interface\{FFA4D25D-8411-40F8-919D-3C4CD94FBD29}]
"(Default)" = "IRegistrationUpdateHook"

[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CoCreateAsync"

[HKCR\Interface\{2A142934-F3E4-4D68-A360-3FE35783E849}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\Interface\{FB3B0E75-E48E-47C4-BA52-57B7F6E38510}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{268205B6-13E6-4FA2-A1EF-84E4E59F3F1B}\NumMethods]
"(Default)" = "6"

[HKCR\Interface\{FA326D8A-B632-4BCE-858E-12271ABAF613}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{58AC6DE8-F15B-4C6A-91D7-B8FA6A2F4169}\NumMethods]
"(Default)" = "10"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine.1.0\CLSID]
"(Default)" = "{F90B8F59-792D-4F5A-97AD-06E83284F9AB}"

[HKCR\Interface\{837641EA-9158-43EE-B2A1-9CEDC5CBD98F}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachine.1.0"

[HKCR\Interface\{AC992757-3DEC-43C4-8D9D-AA82F8A857E4}]
"(Default)" = "IBrowserHttpRequest2"

[HKCR\Interface\{5A43377F-504A-4FC4-8575-9C98997788BF}\NumMethods]
"(Default)" = "10"

[HKCR\Interface\{CB21D37D-1DD1-444A-AB6A-AE623DF7B4E4}\NumMethods]
"(Default)" = "4"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\Interface\{55D12CB4-DA12-43D6-8100-90174ABBB84F}\NumMethods]
"(Default)" = "14"

[HKCR\ConsumerInputUpdate.ProcessLauncher.1.0]
"(Default)" = "Google Update Process Launcher Class"

[HKCR\ConsumerInputUpdate.ProcessLauncher\CLSID]
"(Default)" = "{5CF02202-6278-47EE-9947-C2D0A057EABD}"

[HKCR\Interface\{CB21D37D-1DD1-444A-AB6A-AE623DF7B4E4}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.Update3WebMachine\CLSID]
"(Default)" = "{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}"

[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}]
"(Default)" = "Google Update Process Launcher Class"

[HKCR\Interface\{AC992757-3DEC-43C4-8D9D-AA82F8A857E4}\NumMethods]
"(Default)" = "4"

[HKCR\Interface\{837641EA-9158-43EE-B2A1-9CEDC5CBD98F}\NumMethods]
"(Default)" = "4"

[HKCR\Interface\{268205B6-13E6-4FA2-A1EF-84E4E59F3F1B}]
"(Default)" = "IProcessLauncher"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine]
"(Default)" = "ConsumerInputUpdate CredentialDialog"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachineFallback.1.0"

[HKCR\Interface\{977ED000-4ECA-454D-AEA2-11824E57A043}\NumMethods]
"(Default)" = "9"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback.1.0\CLSID]
"(Default)" = "{0C6D49F4-6E41-4632-BE86-F210D5D894BA}"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback\CLSID]
"(Default)" = "{0C6D49F4-6E41-4632-BE86-F210D5D894BA}"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachineFallback"

[HKCR\ConsumerInputUpdate.Update3WebMachine.1.0\CLSID]
"(Default)" = "{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}"

[HKCR\Interface\{FA326D8A-B632-4BCE-858E-12271ABAF613}]
"(Default)" = "IPackage"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine\CLSID]
"(Default)" = "{3A40DF53-EB22-49FE-9246-8084403424E7}"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"

[HKCR\Interface\{592DA852-5C4E-49F8-88BC-EA0A893180C6}\NumMethods]
"(Default)" = "4"

[HKCR\Interface\{5E8F3A92-7544-482D-9D34-FFD702697D16}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{55D12CB4-DA12-43D6-8100-90174ABBB84F}]
"(Default)" = "IAppWeb"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback.1.0]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine.1.0]
"(Default)" = "ConsumerInput.OneClickProcessLauncher"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C7 4C 4A 2A 8E 1B E5 46 FC 8B 54 C6 D9 37 26 70"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine\CLSID]
"(Default)" = "{F90B8F59-792D-4F5A-97AD-06E83284F9AB}"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine.1.0]
"(Default)" = "ConsumerInputUpdate CredentialDialog"

[HKCR\Interface\{FB3B0E75-E48E-47C4-BA52-57B7F6E38510}]
"(Default)" = "IAppBundleWeb"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\Interface\{592DA852-5C4E-49F8-88BC-EA0A893180C6}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.CoCreateAsync.1.0]
"(Default)" = "CoCreateAsync"

[HKCR\Interface\{7096D298-02B5-4AE9-94E1-C16E27553D17}]
"(Default)" = "IGoogleUpdateCore"

[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CredentialDialogMachine"

[HKCR\Interface\{5A43377F-504A-4FC4-8575-9C98997788BF}]
"(Default)" = "ICoCreateAsyncStatus"

[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}\InprocHandler32]
"ThreadingModel" = "Both"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\ProgID]
"(Default)" = "ConsumerInputUpdate.CoreMachineClass.1"

[HKCR\Interface\{C59D48E5-082B-4BB6-9838-BA261C4FBD5C}\NumMethods]
"(Default)" = "24"

[HKCR\Interface\{41E3E6E6-3E50-4F6E-A1F8-1E24440BC6F8}\NumMethods]
"(Default)" = "40"

[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}\ProgID]
"(Default)" = "ConsumerInputUpdate.CredentialDialogMachine.1.0"

[HKCR\Interface\{E3B8A2CD-70B5-49A4-BFD6-0180BE487A4C}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{55D12CB4-DA12-43D6-8100-90174ABBB84F}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{7096D298-02B5-4AE9-94E1-C16E27553D17}\NumMethods]
"(Default)" = "4"

[HKCR\Interface\{FFA4D25D-8411-40F8-919D-3C4CD94FBD29}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{0E02C3DE-FDA9-4381-99E6-7ED76A518504}]
"(Default)" = "PSFactoryBuffer"

[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}\InprocServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine\CLSID]
"(Default)" = "{8AF9C44C-E497-4776-A7EF-F6455F982825}"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\Elevation]
"Enabled" = "1"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CoreMachineClass"

[HKCR\ConsumerInputUpdate.CoreMachineClass]
"(Default)" = "Google Update Core Class"

[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}]
"CLSID" = "{F90B8F59-792D-4F5A-97AD-06E83284F9AB}"

[HKCR\Interface\{2A142934-F3E4-4D68-A360-3FE35783E849}\NumMethods]
"(Default)" = "13"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine.1.0\CLSID]
"(Default)" = "{8AF9C44C-E497-4776-A7EF-F6455F982825}"

[HKCR\Interface\{977ED000-4ECA-454D-AEA2-11824E57A043}]
"(Default)" = "IProgressWndEvents"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\ConsumerInputUpdate.ProcessLauncher\CurVer]
"(Default)" = "ConsumerInputUpdate.ProcessLauncher.1.0"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine]
"(Default)" = "ConsumerInput.OneClickProcessLauncher"

[HKCR\Interface\{41E3E6E6-3E50-4F6E-A1F8-1E24440BC6F8}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{37EB1FA3-2181-4EED-8C9F-363068501901}\NumMethods]
"(Default)" = "39"

[HKCR\ConsumerInputUpdate.Update3WebMachineFallback\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3WebMachineFallback.1.0"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\Elevation]
"Enabled" = "1"

[HKCR\Interface\{E3B8A2CD-70B5-49A4-BFD6-0180BE487A4C}\NumMethods]
"(Default)" = "10"

[HKCR\Interface\{CCE83B2E-3794-41FC-8179-46BFEA22148A}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}]
"Policy" = "3"

[HKCR\ConsumerInput.OneClickProcessLauncherMachine\CurVer]
"(Default)" = "ConsumerInput.OneClickProcessLauncherMachine.1.0"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\Elevation]
"Enabled" = "1"

[HKCR\Interface\{58AC6DE8-F15B-4C6A-91D7-B8FA6A2F4169}]
"(Default)" = "IGoogleUpdate3"

[HKCR\Interface\{4F3440C0-EB6A-46F2-94D8-2D74A0D21C5D}\NumMethods]
"(Default)" = "4"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\Elevation]
"Enabled" = "1"

[HKCR\Interface\{37EB1FA3-2181-4EED-8C9F-363068501901}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{52C0A3BA-1DE8-477D-91F4-F82D3824C304}\NumMethods]
"(Default)" = "8"

[HKCR\Interface\{C59D48E5-082B-4BB6-9838-BA261C4FBD5C}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{0E02C3DE-FDA9-4381-99E6-7ED76A518504}\InProcServer32]
"ThreadingModel" = "Both"

[HKCR\Interface\{CB21D37D-1DD1-444A-AB6A-AE623DF7B4E4}]
"(Default)" = "ICredentialDialog"

[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}]
"(Default)" = "Google Update Core Class"

[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}\ProgID]
"(Default)" = "ConsumerInput.OneClickProcessLauncherMachine.1.0"

[HKCR\ConsumerInputUpdate.CoCreateAsync.1.0\CLSID]
"(Default)" = "{87A125E5-B663-496F-954E-488A82FAC012}"

[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}\VersionIndependentProgID]
"(Default)" = "ConsumerInput.OneClickProcessLauncherMachine"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\Interface\{837641EA-9158-43EE-B2A1-9CEDC5CBD98F}]
"(Default)" = "IGoogleUpdate3WebSecurity"

[HKCR\Interface\{4F3440C0-EB6A-46F2-94D8-2D74A0D21C5D}]
"(Default)" = "IOneClickProcessLauncher"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\ProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\Interface\{5E8F3A92-7544-482D-9D34-FFD702697D16}]
"(Default)" = "IAppVersion"

[HKCR\ConsumerInputUpdate.Update3WebMachine\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3WebMachine.1.0"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\Interface\{268205B6-13E6-4FA2-A1EF-84E4E59F3F1B}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{7096D298-02B5-4AE9-94E1-C16E27553D17}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine.1.0]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\Interface\{C59D48E5-082B-4BB6-9838-BA261C4FBD5C}]
"(Default)" = "ICurrentState"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0\CLSID]
"(Default)" = "{65BF611F-85CD-4E7F-966C-853573462C14}"

[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachineFallback"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\ConsumerInputUpdate.Update3WebMachine.1.0]
"(Default)" = "Google Update Broker Class Factory"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\Elevation]
"Enabled" = "1"

[HKCR\Interface\{52C0A3BA-1DE8-477D-91F4-F82D3824C304}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\Interface\{AC992757-3DEC-43C4-8D9D-AA82F8A857E4}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"

[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}\ProgID]
"(Default)" = "ConsumerInputUpdate.CoCreateAsync.1.0"

[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}]
"(Default)" = "CoCreateAsync"

[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\Interface\{FB3B0E75-E48E-47C4-BA52-57B7F6E38510}\NumMethods]
"(Default)" = "24"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback\CurVer]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback\CLSID]
"(Default)" = "{65BF611F-85CD-4E7F-966C-853573462C14}"

[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"

[HKCR\ConsumerInputUpdate.ProcessLauncher.1.0\CLSID]
"(Default)" = "{5CF02202-6278-47EE-9947-C2D0A057EABD}"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine\CurVer]
"(Default)" = "ConsumerInputUpdate.CredentialDialogMachine.1.0"

[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.ProcessLauncher"

[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"

[HKCR\Interface\{CCE83B2E-3794-41FC-8179-46BFEA22148A}\NumMethods]
"(Default)" = "5"

[HKCR\ConsumerInputUpdate.CoreMachineClass.1\CLSID]
"(Default)" = "{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}"

[HKCR\ConsumerInputUpdate.CredentialDialogMachine.1.0\CLSID]
"(Default)" = "{3A40DF53-EB22-49FE-9246-8084403424E7}"

[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"

[HKCR\ConsumerInputUpdate.CoreMachineClass\CLSID]
"(Default)" = "{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}]
[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}\InprocHandler32]
[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}\InprocServer32]
[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}]

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"
"c"

The process ConsumerInputUpdate.exe:1600 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "57 6E 18 D4 D2 C0 BD B2 27 2C 08 42 78 B6 D0 68"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ConsumerInputUpdate.exe]
"DisableExceptionChainValidation" = "0"

[HKLM\SOFTWARE\ConsumerInput\Update]
"Path" = "%Program Files%\Consumer Input\Update\ConsumerInputUpdate.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Program Files%\Consumer Input\Update]
"ConsumerInputUpdate.exe" = "ConsumerInput Update"

[HKLM\SOFTWARE\ConsumerInput\Update]
"Version" = "1.3.25.309"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"InstallTime" = "1430810771"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"pv" = "1.3.25.309"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"brand" = "GGLS"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"pv" = "1.3.25.309"
"Name" = "ConsumerInput Update"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"client" = "spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"UpdateAvailableCount"

[HKLM\SOFTWARE\ConsumerInput\Update]
"mi"
"LastChecked"
"eulaaccepted"
"uid"
"ui"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"UpdateAvailableSince"

The process ConsumerInputUpdate.exe:1968 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "41 43 56 21 E2 58 2C 99 FF 71 04 17 16 4F CC 05"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update]
"eulaaccepted"

The process ConsumerInputUpdate.exe:548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C9 4C 3C 69 C9 69 90 3A 1C DA D5 D0 44 1B 10 3A"

[HKCU\Software\ConsumerInput\Update\proxy]
"source" = "IE"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"
"c"

The process ConsumerInputUpdate.exe:1576 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc.1.0\CLSID]
"(Default)" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

[HKCR\AppID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"ServiceParameters" = "/comsvc"

[HKCR\AppID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"LocalService" = "consumerinput_updatem"

[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebSvc"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc.1.0]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\AppID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"(Default)" = "ServiceModule"

[HKCR\ConsumerInputUpdate.Update3WebSvc\CLSID]
"(Default)" = "{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}"

[HKCR\ConsumerInputUpdate.CoreClass\CLSID]
"(Default)" = "{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}"

[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3COMClassService.1.0"

[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}]
"AppID" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

[HKCR\ConsumerInputUpdate.CoreClass.1]
"(Default)" = "Google Update Core Class"

[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\ConsumerInputUpdate.Update3COMClassService.1.0]
"(Default)" = "Update3COMClass"

[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassSvc"

[HKCR\ConsumerInputUpdate.Update3WebSvc.1.0\CLSID]
"(Default)" = "{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}"

[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}\ProgID]
"(Default)" = "ConsumerInputUpdate.CoreClass.1"

[HKCR\ConsumerInputUpdate.CoreClass]
"(Default)" = "Google Update Core Class"

[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"AppID" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"(Default)" = "Update3COMClass"

[HKCR\ConsumerInputUpdate.Update3WebSvc\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3WebSvc.1.0"

[HKCR\ConsumerInputUpdate.Update3WebSvc.1.0]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\ConsumerInputUpdate.Update3COMClassService\CLSID]
"(Default)" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"

[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CoreClass"

[HKCR\ConsumerInputUpdate.Update3COMClassService]
"(Default)" = "Update3COMClass"

[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"AppID" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"

[HKCR\ConsumerInputUpdate.Update3COMClassService.1.0\CLSID]
"(Default)" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"

[HKCR\ConsumerInputUpdate.Update3COMClassService\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3COMClassService.1.0"

[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebSvc.1.0"

[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}]
"(Default)" = "Google Update Core Class"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BD DE 32 42 DF A9 42 6D 91 0B 77 CD AC 1E C6 CE"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc\CLSID]
"(Default)" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc\CurVer]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassSvc.1.0"

[HKCR\AppID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"(Default)" = "ServiceModule"

[HKCR\ConsumerInputUpdate.CoreClass.1\CLSID]
"(Default)" = "{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}"

[HKCR\ConsumerInputUpdate.Update3WebSvc]
"(Default)" = "ConsumerInputUpdate Update3Web"

[HKCR\ConsumerInputUpdate.CoreClass\CurVer]
"(Default)" = "ConsumerInputUpdate.CoreClass.1"

[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3COMClassService"

[HKCR\AppID\ConsumerInputUpdate.exe]
"AppID" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"

[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc]
"(Default)" = "ConsumerInput Update Legacy On Demand"

[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}\ProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassSvc.1.0"

[HKCR\AppID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"LocalService" = "consumerinput_update"

[HKCR\AppID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"ServiceParameters" = "/comsvc"

[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}]
"AppID" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"

The Trojan deletes the following registry key(s):

[HKCR\AppID\ConsumerInputUpdate.exe]

The process ciff-3.2.0-12099.exe:1328 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B0 97 40 3D D0 9F 49 40 8D E2 D5 84 93 26 E4 A9"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Products\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"InstallDir" = "%Program Files%\Consumer Input\Firefox"
"InstallTime" = "1430810813"
"UninstallPath" = "%Program Files%\Consumer Input\Firefox\uninstall.exe /S"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Mozilla\Firefox\Extensions]
"ConsumerInput@Compete" = "%Program Files%\Consumer Input\Firefox\ciff-3.2.0-12099.xpi"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"Name" = "Consumer Input FF"
"lang" = "en"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"client" = "spruce000fox|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}"

[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"pv" = "3.2.0.12099"

The process %original file name%.exe:1360 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1E 00 00 00 01 00 00 00 00 00 00 00"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "86 15 B4 8E F6 D7 07 BC F5 F8 C8 B3 C8 60 E4 4B"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"

The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The Trojan deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"

Dropped PE files

MD5 File path
7b110c27e90217ff3bd49cef739a2e1d c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\ConsumerInputCrashHandler.exe
7b110c27e90217ff3bd49cef739a2e1d c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdate.exe
14f8e799e11716ce374d42cc6cbf6ede c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdateBroker.exe
a5f9015e3152964a06cc1fb09421813e c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdateOnDemand.exe
6d0f507eb95e528f4801d7dd8d613c4f c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\goopdate.dll
5aaf1b0f0275aecbc12f823e75dd2a69 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\goopdateres_de.dll
75e9268adff3a743e9bc0253070fa1fb c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\goopdateres_en.dll
8e3f614721e2c5595f589b834a1aad70 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\goopdateres_es-419.dll
190510f059639a91717d5435ee7746b6 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\goopdateres_es.dll
c95a2759959f049e776bc760fac5e401 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\goopdateres_fr.dll
0dcf385404aed30f0e14b855dd8ac347 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\goopdateres_ja.dll
73464572702ac3373953526e5f455a84 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\goopdateres_zh-CN.dll
8501135f1cea578e4d279722e25d67d2 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\psmachine.dll
2691bb6326ff0ac20f76bc1d3ffe9157 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GUMB.tmp\psuser.dll
fba9f8238c551c871c2826d1d161281f c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsc4.tmp
ef860ffc8ae460fa3df95b9125a6bbe9 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nscA.tmp
4cf3a81ab4579b30117c8a39a489d51d c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nso6.tmp\System.dll
0bea21545b130f74ad40160ae8ac05ea c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nso6.tmp\UAC.dll
7b84f34199b561e017cbb43fa50564d2 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nso6.tmp\nsis_plugin.dll
17de833e46570ca15ad556d71fe33bd8 c:\Program Files\Consumer Input\CIuninstall.exe
7b110c27e90217ff3bd49cef739a2e1d c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputCrashHandler.exe
7b110c27e90217ff3bd49cef739a2e1d c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputUpdate.exe
14f8e799e11716ce374d42cc6cbf6ede c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe
a5f9015e3152964a06cc1fb09421813e c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe
6d0f507eb95e528f4801d7dd8d613c4f c:\Program Files\Consumer Input\Update\1.3.25.309\goopdate.dll
5aaf1b0f0275aecbc12f823e75dd2a69 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_de.dll
75e9268adff3a743e9bc0253070fa1fb c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_en.dll
8e3f614721e2c5595f589b834a1aad70 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_es-419.dll
190510f059639a91717d5435ee7746b6 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_es.dll
c95a2759959f049e776bc760fac5e401 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_fr.dll
0dcf385404aed30f0e14b855dd8ac347 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_ja.dll
73464572702ac3373953526e5f455a84 c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_zh-CN.dll
8501135f1cea578e4d279722e25d67d2 c:\Program Files\Consumer Input\Update\1.3.25.309\psmachine.dll
2691bb6326ff0ac20f76bc1d3ffe9157 c:\Program Files\Consumer Input\Update\1.3.25.309\psuser.dll
7b110c27e90217ff3bd49cef739a2e1d c:\Program Files\Consumer Input\Update\ConsumerInputUpdate.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 23628 24064 4.46394 856b32eb77dfd6fb67f21d6543272da5
.rdata 28672 4764 5120 3.4982 dc77f8a1e6985a4361c55642680ddb4f
.data 36864 154712 1024 3.3278 7922d4ce117d7d5b3ac2cffe4b0b5e4f
.ndata 192512 61440 0 0 d41d8cd98f00b204e9800998ecf8427e
.rsrc 253952 2536 2560 3.13983 5b5a2d9d119a78aca9bef9d54b647674

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

Total found: 399
87af60575e95350381303447cd2e0d96
170ca29c553340469595fe0aff0bea3d
20c35e976d0214022bce82cce11428ff
c708535213ceac6363a92ef12b6ba427
1c4f36e36ec6467cce6c267e575bfba7
650f4b17efbf43ef962fc3356273cebf
84dd9b5df87653e9be737565c19e002f
59998feedab348f6102fa7338ef926b8
1c0bdb1c857d40713dc74550b1d457ac
a293d67d7b8841a66fe0c6b451f3b195
925358a14978d562ad875b41dcfd4285
d754532bf1af334d3e5e634cf7eedd35
b2d0baa8708c60e33990f8c3da982fbc
0545c5fd5d9f227629e1fd1d2b8de53e
0b26705557ed087df3a4e86054649170
f66749fac171b2a4f5f2a7550f5e78eb
24490f1552fbe05b0e518433d1c927b4
81128e76322d1d4e63606a027d4d1c36
21970fa6d812a33ffc229b96eceb1bae
ab01e2dc7a26a914027e73bc98eb7452
19c600cd0b59636af78613dc63deff30
d2a635fbacbad0ac837646edca81bf8f
a24506925709abb2c9cd0c419ea2ecd7
1bdf99e3c8aef33fd3f694378574c64e
8ce9157890da386be7cca4dd65f0f613

URLs

URL IP
hxxp://wikitweak.com/downloads/consumerinput_c.exe
hxxp://e6845.ce.akamaiedge.net/pca3-g5.crl
hxxp://e6845.ce.akamaiedge.net/sv.crl
hxxp://e6845.ce.akamaiedge.net/ThawteTimestampingCA.crl
hxxp://e6845.ce.akamaiedge.net/tss-ca-g2.crl
hxxp://a767.g.akamai.net/msdownload/update/v3/static/trustedr/en/authrootseq.txt
hxxp://a767.g.akamai.net/msdownload/update/v3/static/trustedr/en/authrootstl.cab
hxxp://a767.g.akamai.net/msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab 87.245.221.90
hxxp://sv.symcb.com/sv.crl 23.43.133.163
hxxp://s1.symcb.com/pca3-g5.crl 23.43.133.163
hxxp://ts-crl.ws.symantec.com/tss-ca-g2.crl 23.43.133.163
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt 87.245.221.90
hxxp://www.wikitweak.com/downloads/consumerinput_c.exe 54.85.75.165
hxxp://crl.thawte.com/ThawteTimestampingCA.crl 23.43.133.163
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt 87.245.221.90
update.consumerinput.com 199.168.174.152
dcs-files.consumerinput.com 23.65.116.97
sddcs.consumerinput.com 199.79.48.60


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers

Traffic

GET /pca3-g5.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: s1.symcb.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Server: Apache
ETag: "97b93bbbb813910cb8bfc80753e88aff:1427247319"
Last-Modified: Wed, 25 Mar 2015 01:35:19 GMT
Date: Tue, 05 May 2015 07:26:06 GMT
Content-Length: 533
Connection: keep-alive
Content-Type: application/pkix-crl
0...0..0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U
....VeriSign Trust Network1:08..U...1(c) 2006 VeriSign, Inc. - For aut
horized use only1E0C..U...<VeriSign Class 3 Public Primary Certific
ation Authority - G5..150318000000Z..150630235959Z0...*.H.............
R.`Ts.......... .p.....V,..E...n]...T....R.....5.....j.I*J.:q.......^.
.2...p..3...!)Oo6[...D.............|..$......R$.......<(........Ohl
.....'...C......X.......r......c.........G.....K.j/.L....7O<G....X.
.4s....2.J.1.8`......?....-(#h.i.p.Z..HB;.-g#...#q..HTTP/1.1 200 OK..S
erver: Apache..ETag: "97b93bbbb813910cb8bfc80753e88aff:1427247319"..La
st-Modified: Wed, 25 Mar 2015 01:35:19 GMT..Date: Tue, 05 May 2015 07:
26:06 GMT..Content-Length: 533..Connection: keep-alive..Content-Type:
application/pkix-crl..0...0..0...*.H........0..1.0...U....US1.0...U...
.VeriSign, Inc.1.0...U....VeriSign Trust Network1:08..U...1(c) 2006 Ve
riSign, Inc. - For authorized use only1E0C..U...<VeriSign Class 3 P
ublic Primary Certification Authority - G5..150318000000Z..15063023595
9Z0...*.H.............R.`Ts.......... .p.....V,..E...n]...T....R.....5
.....j.I*J.:q.......^..2...p..3...!)Oo6[...D.............|..$......R$.
......<(........Ohl.....'...C......X.......r......c.........G.....K
.j/.L....7O<G....X..4s....2.J.1.8`......?....-(#h.i.p.Z..HB;.-g#...
#q....

<<< skipped >>>

GET /tss-ca-g2.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: ts-crl.ws.symantec.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Server: Apache
ETag: "03792918f2bc70839feddb85016d497c:1430773911"
Last-Modified: Mon, 04 May 2015 21:11:51 GMT
Date: Tue, 05 May 2015 07:26:07 GMT
Content-Length: 477
Connection: keep-alive
Content-Type: application/pkix-crl
0...0.....0...*.H........0^1.0...U....US1.0...U....Symantec Corporatio
n100...U...'Symantec Time Stamping Services CA - G2..150504210113Z..15
0514210113Z.00.0...U.#..0..._..n\..t...}.?..L...0...U.......(0...*.H..
...........:..s..W|....e.Q{*..v.u?9.n..XePs.9.[......=.u.>..OD....q
...rb.#r#I...W....K.g........B2....|.t..}....*U}k.9k...o.$...)4c.9...\
.Vk.........nJ..f.._..F.A.O.h.*..d!..|..BD3.GkU...^Z...\.?..0;qT;j..J1
.7..S$#.......X.i..........."/..........0T.= ....&..pd...<..HTTP/1.
1 200 OK..Server: Apache..ETag: "03792918f2bc70839feddb85016d497c:1430
773911"..Last-Modified: Mon, 04 May 2015 21:11:51 GMT..Date: Tue, 05 M
ay 2015 07:26:07 GMT..Content-Length: 477..Connection: keep-alive..Con
tent-Type: application/pkix-crl..0...0.....0...*.H........0^1.0...U...
.US1.0...U....Symantec Corporation100...U...'Symantec Time Stamping Se
rvices CA - G2..150504210113Z..150514210113Z.00.0...U.#..0..._..n\..t.
..}.?..L...0...U.......(0...*.H.............:..s..W|....e.Q{*..v.u?9.n
..XePs.9.[......=.u.>..OD....q...rb.#r#I...W....K.g........B2....|.
t..}....*U}k.9k...o.$...)4c.9...\.Vk.........nJ..f.._..F.A.O.h.*..d!..
|..BD3.GkU...^Z...\.?..0;qT;j..J1.7..S$#.......X.i..........."/.......
...0T.= ....&..pd...<....


GET /ThawteTimestampingCA.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: crl.thawte.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Server: Apache
ETag: "02e277383c1ef089951c3afe285accbd:1427488519"
Last-Modified: Fri, 27 Mar 2015 20:35:19 GMT
Date: Tue, 05 May 2015 07:26:07 GMT
Content-Length: 341
Connection: keep-alive
Content-Type: application/pkix-crl
0..Q0..0...*.H........0..1.0...U....ZA1.0...U....Western Cape1.0...U..
..Durbanville1.0...U....Thawte1.0...U....Thawte Certification1.0...U..
..Thawte Timestamping CA..150318000000Z..150630235959Z0...*.H.........
.....-0.u.f..0.C..O. ..._....m....V......Zb.=.!`...@..[.Q.c...#..}b...
Q..c...q....X.....}u}........K..}A([email protected].[........P9G^..HTTP/1.1
200 OK..Server: Apache..ETag: "02e277383c1ef089951c3afe285accbd:142748
8519"..Last-Modified: Fri, 27 Mar 2015 20:35:19 GMT..Date: Tue, 05 May
2015 07:26:07 GMT..Content-Length: 341..Connection: keep-alive..Conte
nt-Type: application/pkix-crl..0..Q0..0...*.H........0..1.0...U....ZA1
.0...U....Western Cape1.0...U....Durbanville1.0...U....Thawte1.0...U..
..Thawte Certification1.0...U....Thawte Timestamping CA..150318000000Z
..150630235959Z0...*.H..............-0.u.f..0.C..O. ..._....m....V....
..Zb.=.!`...@..[.Q.c...#..}b...Q..c...q....X.....}u}........K..}A(...b
[email protected].[........P9G^....


GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Content-Type: text/plain
Last-Modified: Mon, 23 Feb 2015 19:55:44 GMT
Accept-Ranges: bytes
ETag: "0e05fb5a24fd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 18
Cache-Control: max-age=7018
Date: Tue, 05 May 2015 07:26:15 GMT
Connection: keep-alive
X-CCC: IT
X-CID: 2
1401D04FA2B5AFD36D....



GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1

Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Content-Type: application/octet-stream
Last-Modified: Tue, 24 Feb 2015 00:37:01 GMT
Accept-Ranges: bytes
ETag: "80b4d90ca4fd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 48151
Cache-Control: max-age=13537
Date: Tue, 05 May 2015 07:26:16 GMT
Connection: keep-alive
X-CCC: IT
X-CID: 2
MSCF............,...................I......._.........WFr. .authroot.s
tl.J..:58..CK...8T.....c.5.}l.s..%D..[R.l...l7iTBWiA..*......D!K.....d
....*s.....<..s.;.93..~....g.....Y.......q.....9........;..2..^....
Y%,..,8......Wf.Q;s.....n&v<;.Wcs....AB..BD]].].p.....|.z$.......?.
.*../.."$... ..P.."..K9.P>.g.mt...q.yqT.......[...%wX.]..(";...*..x
....;.gt...W..pH[.*.A.]..J.......<z'X..%..GV.7......2Z8q.OU?.Y=....
%ln..A.P.....c=D...=h..Z..78G....].........Z...0.O..!.B(.0a....rv<.
.K.Z......[.PJ."6...(...p....ffV&6,........#.^^.y.....C.]...`U..;]....
.7.;..<\.2w|.`v.......v.|.xD.G.'..4z....1..A.5.h.. .p.@.@.#h..T;...
...z..Y*..)...Is..y....W..z..XP*LU..........4.q.....\...|.F.".[.l9.3.o
....>,...y.K....&..B...^.cA#......q.976?.E..i...g...s.....K$&...(.[
......J..a.z4......5,wk.....L.9..=.j..r........Z........U`..;....5.&.X
..h<Uw.F.ifP...r....A=..N...._...R........`B.......re...X....U....a
..._...XU.z..s..>lt.9..W..4..r.w...I...C....L.&..l.,...`.S.A#.P.d.
...?N.qUd....#....l......6v.F..<V...#..X...;-|...da...O#.....C.....
....3`..X....I.S'.>."*.X.z.V..0.........j.oO..xRnL.....X...q.[..[,X
F..L.j....D..=..N..[....G7...l.Hi!.i.p@....,"..E.;...8f."....y.......&
lt;..........h.a.b..|....<f..8,....6...k..T".|:.....zm.........n..I
..x.....1.=....q..I.6....;...O.....rf.1..H.a..|....zk..c.5.A&~o...R...
....V...:..c...:....<Z....3..I1.B..%.9.3....:.X...Elk.3.b..>*../
.{..O.=......7..}[email protected]|iQ.....G...A..3...B...0A*@I.[.....4.
..\..?..R.c.(.8(..h..w.s.....X ........>r|...?._..%..O.d.,.....

<<< skipped >>>

GET /msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt HTTP/1.1

Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Content-Type: application/x-x509-ca-cert
Last-Modified: Fri, 20 Feb 2015 20:14:49 GMT
Accept-Ranges: bytes
ETag: "80c29be0494dd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 958
Date: Tue, 05 May 2015 07:26:16 GMT
Connection: keep-alive
X-CCC: IT
X-CID: 2
0...0..................&..0...*.H........0L1 0...U....GlobalSign Root 
CA - R21.0...U....GlobalSign1.0...U....GlobalSign0...061215080000Z..21
1215080000Z0L1 0...U....GlobalSign Root CA - R21.0...U....GlobalSign1.
0...U....GlobalSign0.."0...*.H.............0..........$...o(.EB..>!
T.....p......_.....0\....{...`......S..{~s..R.{J..I.^...Z..z........%.
.J.*./..w.....|.....:,.....Y}...._^Ij.9^.4..x....l..K..}.yM..-.!..l[}.
.).....I.$b. ........'. s.........../..M..6...z..m.a..\....Q..Z.......
.`..._.r.`.^...J.?....!................0..0...U...........0...U.......
0....0...U.........Wg...j..Y..-.....06..U.../0-0 .).'.%hXXp://crl.glob
alsign.net/root-r2.crl0...U.#..0......Wg...j..Y..-.....0...*.H........
.......S..h.....J.D....'O....Cx.....,<na.MK)....&.....bE......3K...
...N..q4..T.F?..*.mT".:b. o.)......\.>.[A...dC-..9...........E.-...
-.tVI...O..nDx9..~..y....o....5.]...m..DmyF1~........n .P._.M........A
jsS..P.n%..L...R..i.........I..... x.`..%@[email protected]/1.1 200
OK..Content-Type: application/x-x509-ca-cert..Last-Modified: Fri, 20 F
eb 2015 20:14:49 GMT..Accept-Ranges: bytes..ETag: "80c29be0494dd01:0".
.Server: Microsoft-IIS/7.5..X-Powered-By: ASP.NET..Content-Length: 958
..Date: Tue, 05 May 2015 07:26:16 GMT..Connection: keep-alive..X-CCC:
IT..X-CID: 2..0...0..................&..0...*.H........0L1 0...U....Gl
obalSign Root CA - R21.0...U....GlobalSign1.0...U....GlobalSign0...061
215080000Z..211215080000Z0L1 0...U....GlobalSign Root CA - R21.0...U..
..GlobalSign1.0...U....GlobalSign0.."0...*.H.............0........

<<< skipped >>>

GET /downloads/consumerinput_c.exe HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: VVV.wikitweak.com
Connection: Keep-Alive
Cache-Control: no-cache


HTTP/1.1 200 OK
Date: Tue, 05 May 2015 07:25:42 GMT
Server: Apache
Last-Modified: Tue, 28 Apr 2015 17:13:29 GMT
ETag: "20cd4-1c1eb8-514cbfb3a43c0"
Accept-Ranges: bytes
Content-Length: 1842872
Cache-Control: max-age=10, s-maxage=10, private, no-cache, no-store, must-revalidate, proxy-revalidate
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/octet-stream
MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8
...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8.......
.PE..L...b|.N.................t...z...B...8............@..............
....................%....@.................................@..........
.X}.............. ....`...............................................
........................................text....r.......t.............
..... ..`.rdata..n .......,...x..............@[email protected].... ...........
...............@....ndata...................................rsrc...X}.
......~..................@[email protected][email protected].
......................................................................
......................................................................
......................................................................
......................................................................
...............................................U....\.}..t .}.F.E.u..H
[email protected][email protected]...
..@..}[email protected]... M..........M........E...FQ.....NU
..M.......M...VT..U........FP..E...............E.P.M...H.@..E..P.E..E.
[email protected]}[email protected].}.j.W.E......E.....
[email protected][email protected][email protected] [email protected].
u.....@._^3.[.....L$....G...i. @...T.....tUVW.q.3.;5..G.sD..i. @...D..
S.....t.G.....t...O..t .....u...3....3...F. @..;5..G.r.[_^...U..QQ

<<< skipped >>>

GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Content-Type: text/plain
Last-Modified: Mon, 23 Feb 2015 19:55:44 GMT
Accept-Ranges: bytes
ETag: "0e05fb5a24fd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 18
Cache-Control: max-age=7018
Date: Tue, 05 May 2015 07:26:15 GMT
Connection: keep-alive
X-CCC: IT
X-CID: 2
1401D04FA2B5AFD36D....



GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1

Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Content-Type: application/octet-stream
Last-Modified: Tue, 24 Feb 2015 00:37:01 GMT
Accept-Ranges: bytes
ETag: "80b4d90ca4fd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 48151
Cache-Control: max-age=13538
Date: Tue, 05 May 2015 07:26:15 GMT
Connection: keep-alive
X-CCC: IT
X-CID: 2
MSCF............,...................I......._.........WFr. .authroot.s
tl.J..:58..CK...8T.....c.5.}l.s..%D..[R.l...l7iTBWiA..*......D!K.....d
....*s.....<..s.;.93..~....g.....Y.......q.....9........;..2..^....
Y%,..,8......Wf.Q;s.....n&v<;.Wcs....AB..BD]].].p.....|.z$.......?.
.*../.."$... ..P.."..K9.P>.g.mt...q.yqT.......[...%wX.]..(";...*..x
....;.gt...W..pH[.*.A.]..J.......<z'X..%..GV.7......2Z8q.OU?.Y=....
%ln..A.P.....c=D...=h..Z..78G....].........Z...0.O..!.B(.0a....rv<.
.K.Z......[.PJ."6...(...p....ffV&6,........#.^^.y.....C.]...`U..;]....
.7.;..<\.2w|.`v.......v.|.xD.G.'..4z....1..A.5.h.. .p.@.@.#h..T;...
...z..Y*..)...Is..y....W..z..XP*LU..........4.q.....\...|.F.".[.l9.3.o
....>,...y.K....&..B...^.cA#......q.976?.E..i...g...s.....K$&...(.[
......J..a.z4......5,wk.....L.9..=.j..r........Z........U`..;....5.&.X
..h<Uw.F.ifP...r....A=..N...._...R........`B.......re...X....U....a
..._...XU.z..s..>lt.9..W..4..r.w...I...C....L.&..l.,...`.S.A#.P.d.
...?N.qUd....#....l......6v.F..<V...#..X...;-|...da...O#.....C.....
....3`..X....I.S'.>."*.X.z.V..0.........j.oO..xRnL.....X...q.[..[,X
F..L.j....D..=..N..[....G7...l.Hi!.i.p@....,"..E.;...8f."....y.......&
lt;..........h.a.b..|....<f..8,....6...k..T".|:.....zm.........n..I
..x.....1.=....q..I.6....;...O.....rf.1..H.a..|....zk..c.5.A&~o...R...
....V...:..c...:....<Z....3..I1.B..%.9.3....:.X...Elk.3.b..>*../
.{..O.=......7..}[email protected]|iQ.....G...A..3...B...0A*@I.[.....4.
..\..?..R.c.(.8(..h..w.s.....X ........>r|...?._..%..O.d.,.....

<<< skipped >>>

GET /msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt HTTP/1.1

Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Content-Type: application/x-x509-ca-cert
Last-Modified: Fri, 20 Feb 2015 20:14:49 GMT
Accept-Ranges: bytes
ETag: "80c29be0494dd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 958
Date: Tue, 05 May 2015 07:26:16 GMT
Connection: keep-alive
X-CCC: IT
X-CID: 2
0...0..................&..0...*.H........0L1 0...U....GlobalSign Root 
CA - R21.0...U....GlobalSign1.0...U....GlobalSign0...061215080000Z..21
1215080000Z0L1 0...U....GlobalSign Root CA - R21.0...U....GlobalSign1.
0...U....GlobalSign0.."0...*.H.............0..........$...o(.EB..>!
T.....p......_.....0\....{...`......S..{~s..R.{J..I.^...Z..z........%.
.J.*./..w.....|.....:,.....Y}...._^Ij.9^.4..x....l..K..}.yM..-.!..l[}.
.).....I.$b. ........'. s.........../..M..6...z..m.a..\....Q..Z.......
.`..._.r.`.^...J.?....!................0..0...U...........0...U.......
0....0...U.........Wg...j..Y..-.....06..U.../0-0 .).'.%hXXp://crl.glob
alsign.net/root-r2.crl0...U.#..0......Wg...j..Y..-.....0...*.H........
.......S..h.....J.D....'O....Cx.....,<na.MK)....&.....bE......3K...
...N..q4..T.F?..*.mT".:b. o.)......\.>.[A...dC-..9...........E.-...
-.tVI...O..nDx9..~..y....o....5.]...m..DmyF1~........n .P._.M........A
jsS..P.n%..L...R..i.........I..... x.`..%@[email protected]/1.1 200
OK..Content-Type: application/x-x509-ca-cert..Last-Modified: Fri, 20 F
eb 2015 20:14:49 GMT..Accept-Ranges: bytes..ETag: "80c29be0494dd01:0".
.Server: Microsoft-IIS/7.5..X-Powered-By: ASP.NET..Content-Length: 958
..Date: Tue, 05 May 2015 07:26:16 GMT..Connection: keep-alive..X-CCC:
IT..X-CID: 2..0...0..................&..0...*.H........0L1 0...U....Gl
obalSign Root CA - R21.0...U....GlobalSign1.0...U....GlobalSign0...061
215080000Z..211215080000Z0L1 0...U....GlobalSign Root CA - R21.0...U..
..GlobalSign1.0...U....GlobalSign0.."0...*.H.............0........

<<< skipped >>>

GET /sv.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: sv.symcb.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache


HTTP/1.1 200 OK
Server: Apache
ETag: "38147507459bb0851c2d006e713a7902:1430773895"
Last-Modified: Mon, 04 May 2015 21:11:35 GMT
Date: Tue, 05 May 2015 07:26:06 GMT
Content-Length: 7338
Connection: keep-alive
Content-Type: application/pkix-crl
0...0......0...*.H........0.1.0...U....US1.0...U....Symantec Corporati
on1.0...U....Symantec Trust Network100...U...'Symantec Class 3 SHA256
Code Signing CA..150504210109Z..150518210109Z0...0!...o. .z..%5.O.W...
.150306094921Z0!....~_..N.W..f.1....150309185437Z0!......)-.5....Y....
.150420152841Z0!.... ...E...H] .....150324162430Z0!...........m.......
.150427234712Z0!..../G..g.......x...150306012430Z0!...i....U..a:...Ll.
.150112095207Z0!.......".pO<........150309205556Z0!....s.T..B...*o.
[email protected]!...U..p. p...Z..
.3..150319052518Z0!...V.:..S.).........150318160151Z0!...e.Q.....5]A..
....141021211828Z0!.....dG..eh;.&09....150327074549Z0!..........%aO...
.=..150206171204Z0!...1..^K.. a<E......140820001209Z0!....O.../..ga
..<&*..150216185007Z0!...%.]...B.4..:..i..150217004725Z0!... X.].._
.lMim.....141211172933Z0!...T5}.}..{.`.[.B...150407211816Z0!...WoQ....
..-.B.....150104034111Z0!...cs.....^......"..150203072018Z0!....^.9..e
...v.l1...140409154208Z0!......qK.F.Z..c..\..150303044635Z0!...U.....Z
.%.:.^N...140630094156Z0!...bO.k$..%....9Q...150304201758Z0!...=W.M...
...tl.....150209160708Z0!...>w..Nm.t.2...G...150311091502Z0!...FN^J
{.c.Uby.{....150209100214Z0!...T......@.....!...150115165559Z0!.......
.s..&.:OA....140901114705Z0!........ ........n..150115172549Z0!....N.Y
.D..Te\.-....150128035955Z0!...<d..T&...DE.7....150324091153Z0!....
. .8K.....o..b..150105190117Z0!.......S.1a.....N...141216014011Z0!....
5...r|...#......150407211454Z0!...:.M).*[.pc.P.....141223230305Z0!

<<< skipped >>>

The Trojan connects to the servers at the folowing location(s):

nsc4.tmp_2020:

.text
`.rdata
@.data
.ndata
.rsrc
@.reloc
RegDeleteKeyExW
Kernel32.DLL
PSAPI.DLL
%s=%s
GetWindowsDirectoryW
KERNEL32.dll
ExitWindowsEx
GetAsyncKeyState
USER32.dll
GDI32.dll
SHFileOperationW
ShellExecuteW
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegCreateKeyExW
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
hXXp://ocsp.thawte.com0
.hXXp://crl.thawte.com/ThawteTimestampingCA.crl0
hXXp://ts-ocsp.ws.symantec.com07
 hXXp://ts-aia.ws.symantec.com/tss-ca-g2.cer0<
 hXXp://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
hXXp://sv.symcb.com/sv.crl0f
hXXps://d.symcb.com/cps0%
hXXps://d.symcb.com/rpa0
hXXp://sv.symcd.com0&
hXXp://sv.symcb.com/sv.crt0
<VeriSign Class 3 Public Primary Certification Authority - G50
hXXp://s2.symcb.com0
hXXp://VVV.symauth.com/cps0(
hXXp://VVV.symauth.com/rpa00
hXXp://s1.symcb.com/pca3-g5.crl0
Q.KFb{
###7777_{
###____777
###````87{
<requestedExecutionLevel level="asInvoker" />
<!--The ID below indicates application support for Windows Vista -->
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<!--The ID below indicates application support for Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
2%2*292`2
6*7074787<7
Thawte Certification1
operator
mi_exe_stub.pdb
GetCPInfo
012345678
!"#$%&'(
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.3-Unicode</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
logging set to %d
settings logging to %d
created uninstaller: %d, "%s"
WriteReg: error creating key "%s\%s"
WriteReg: error writing into "%s\%s" "%s"
WriteRegBin: "%s\%s" "%s"="%s"
WriteRegDWORD: "%s\%s" "%s"="0xx"
WriteRegExpandStr: "%s\%s" "%s"="%s"
WriteRegStr: "%s\%s" "%s"="%s"
DeleteRegKey: "%s\%s"
DeleteRegValue: "%s\%s" "%s"
WriteINIStr: wrote [%s] %s=%s in %s
CopyFiles "%s"->"%s"
CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
Error registering DLL: Could not load %s
Error registering DLL: %s not found in %s
GetTTFFontName(%s) returned %s
GetTTFVersionString(%s) returned %s
Exec: failed createprocess ("%s")
Exec: success ("%s")
Exec: command="%s"
ExecShell: success ("%s": file:"%s" params:"%s")
ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
Exch: stack < %d elements
RMDir: "%s"
MessageBox: %d,"%s"
Delete: "%s"
File: wrote %d to "%s"
File: skipped: "%s" (overwriteflag=%d)
File: error creating "%s"
File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"
Rename failed: %s
Rename on reboot: %s
Rename: %s
IfFileExists: file "%s" does not exist, jumping %d
IfFileExists: file "%s" exists, jumping %d
CreateDirectory: "%s" created
CreateDirectory: can't create "%s" - a file already exists
CreateDirectory: can't create "%s" (err=%d)
CreateDirectory: "%s" (%d)
SetFileAttributes: "%s":X
Sleep(%d)
detailprint: %s
Call: %d
Aborting: "%s"
Jump: %d
verifying installer: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
install.log
%u.%u%s%s
Skipping section: "%s"
Section: "%s"
New install of "%s" to "%s"
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
*?|<>/":
invalid registry key
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
x%c
RMDir: RemoveDirectory failed("%s")
RMDir: RemoveDirectory on Reboot("%s")
RMDir: RemoveDirectory("%s")
RMDir: RemoveDirectory invalid input("%s")
Delete: DeleteFile failed("%s")
Delete: DeleteFile on Reboot("%s")
Delete: DeleteFile("%s")
%s: failed opening file "%s"
1\"%CurrentUserName%"\LOCALS~1\Temp\nso6.tmp\nsis_plugin.dll
9|CIIE 3.2.0.12323|CIMT 3.2.1.1080 is completed.
-86E3-400E3156FD28}&appname=Consumer Input Firefox Extension&needsadmin=True&lang=en&appguid={1138A907-2253-45D6-99C1-843A0AC58730}&appname=Consumer Input Internet Explorer Extension&needsadmin=True&lang=en&appguid={B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}&appname=Consumer Input Monitoring Tool&needsadmin=True&lang=en&client=spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}" /silent
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nso6.tmp\nsis_plugin.dll
F-4A2A-BE2F-ED6F4FF63B98}
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nso6.tmp
B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}
-28C4FAE01153}
=2 /S /installie /installff /installcr /panelistidprefix=SPRP1317DD /partnerUrl="hXXp://VVV.moztweak.com/api/postback/?CID=1317&d=1"
r den %1!s!-Installer wird Windows 2000 Service Pack 4 oder h
Unknown Installer ErrorTInstallation failed. %1!s! Installer requires Windows 2000 Service Pack 4 or better.
cessite Windows
Windows 2000 Service Pack 4
n. %1!s! El instalador requiere Windows 2000 Service Pack 4 o superior.
n. %1!s! Installer requiere Windows 2000 Service Pack 4 o versiones posteriores.
1.3.25.309
ConsumerInputUpdateSetup.exe
@ /%s %s /%s
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nscA.tmp
nscA.tmp
File: skipped: "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nso6.tmp\nsis_plugin.dll" (overwriteflag=1)
nsis_plugin.dll"
1F6-380E-4545-86E3-400E3156FD28}&appname=Consumer Input Firefox Extension&needsadmin=True&lang=en&appguid={1138A907-2253-45D6-99C1-843A0AC58730}&appname=Consumer Input Internet Explorer Extension&needsadmin=True&lang=en&appguid={B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}&appname=Consumer Input Monitoring Tool&needsadmin=True&lang=en&client=spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}" /silent")
:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nscA.tmp
156FD28}&appname=Consumer Input Firefox Extension&needsadmin=True&lang=en&appguid={1138A907-2253-45D6-99C1-843A0AC58730}&appname=Consumer Input Internet Explorer Extension&needsadmin=True&lang=en&appguid={B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}&appname=Consumer Input Monitoring Tool&needsadmin=True&lang=en&client=spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}
3.2.0.12099
Temp\nsb7.tmp
72C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}
ak.com/api/postback/?CID=1317&d=
3.2.0.12323
3.2.1.1080
1\Temp\nsc4.tmp /panelid=spruce000 /eulaVersion=20140910 /captureType=2 /S /installie /installff /installcr /panelistidprefix=SPRP1317DD /partnerUrl="hXXp://VVV.moztweak.com/api/postback/?CID=1317&d=1"
VVV.moztweak.com/api/postback/?CID=1317&d=1"
rl="hXXp://VVV.moztweak.com/api/postback/?CID=1317&d=1"
CIFF 3.2.0.12099|CIIE 3.2.0.12323|CIMT 3.2.1.1080
39|{8117A787-ACA7-4EF5-B424-28C4FAE01153}
ak.com/api/postback/?CID=1317&d=1"
pruce000 /eulaVersion=20140910 /captureType=2 /S /installie /installff /installcr /panelistidprefix=SPRP1317DD /partnerUrl="hXXp://VVV.moztweak.com/api/postback/?CID=1317&d=1"
8117A787-ACA7-4EF5-B424-28C4FAE01153}
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsc4.tmp /panelid=spruce000 /eulaVersion=20140910 /captureType=2 /S /installie /installff /installcr /panelistidprefix=SPRP1317DD /partnerUrl="hXXp://VVV.moztweak.com/api/postback/?CID=1317&d=1"
%Program Files%\Consumer Input
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
nsc4.tmp
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd5.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsc4.tmp
%Documents and Settings%\%current user%\Application Data
%Documents and Settings%\%current user%\Local Settings\Application Data
83951616
-2063532032
-2147284440
20140910
{8117A787-ACA7-4EF5-B424-28C4FAE01153}
hXXp://VVV.moztweak.com/api/postback/?CID=1317&d=1
/install "bundlename=Consumer Input&appguid={C7B061F6-380E-4545-86E3-400E3156FD28}&appname=Consumer Input Firefox Extension&needsadmin=True&lang=en&appguid={1138A907-2253-45D6-99C1-843A0AC58730}&appname=Consumer Input Internet Explorer Extension&needsadmin=True&lang=en&appguid={B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}&appname=Consumer Input Monitoring Tool&needsadmin=True&lang=en&client=spruce000|SPRP1317DD7F10DB61E80B4EFA8C472C67B4F85039|{8117A787-ACA7-4EF5-B424-28C4FAE01153}" /silent
Start to register CIMI with parameters: /panelid=spruce000 /eulaVersion=20140910 /captureType=2 /S /installie /installff /installcr /panelistidprefix=SPRP1317DD /partnerUrl="hXXp://VVV.moztweak.com/api/postback/?CID=1317&d=1".
Original user is admin. Registration of CIFF 3.2.0.12099|CIIE 3.2.0.12323|CIMT 3.2.1.1080 is completed.
3.2.4.4265

dca-monitoring.exe_2504:

.text
`.rdata
@.data
.rsrc
@.reloc
<A.tH
<9%u3
t8It.IIt#
.CGy*
FTPj
9t$,t.VV
,4,56,789
xSSSh
FTPjKS
FtPj;S
C.PjRV
Visual C   CRT: Not enough memory to complete call to strerror.
portuguese-brazilian
Broken pipe
Inappropriate I/O control operation
Operation not permitted
operator
GetProcessWindowStation
3.7.16.1
SQLite format 3
CREATE TABLE sqlite_master(
sql text
CREATE TEMP TABLE sqlite_temp_master(
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYATTACHAVINGROUPDATEBEGINNERELEASEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTOUTERIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLY
()$^.* ?[]|\-{},:=!
RegOpenKeyTransactedW
RegCreateKeyTransactedW
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.panelID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.userID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.machineID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.version'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.version'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.installTime'
large file support is disabled
unknown operation
SQL logic error or missing database
foreign_keys
sqlite_compileoption_get
sqlite_compileoption_used
sqlite_log
sqlite_source_id
sqlite_version
sqlite_attach
sqlite_detach
sqlite_stat1
sqlite_rename_parent
sqlite_rename_trigger
sqlite_rename_table
GetProcessHeap
RowKey
SQLITE_
d-d-d d:d:d
d:d:d
d-d-d
failed to allocate %u bytes of memory
failed memory resize %u to %u bytes
922337203685477580
API call with %s database connection pointer
OsError 0x%x (%u)
os_win.c:%d: (%d) %s(%s) - %s
delayed %dms for lock/sharing conflict
%s-shm
%s\etilqs_
%s\%s
Recovered %d frames from WAL file %s
cannot limit WAL size: %s
invalid page number %d
2nd reference to page %d
Failed to read ptrmap key=%d
Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)
%d of %d pages missing from overflow list starting at %d
failed to get page %d
freelist leaf count too big on page %d
Page %d:
unable to get the page. error code=%d
btreeInitPage() returns error code %d
On tree page %d cell %d:
On page %d at right child:
Corruption detected in cell %d on page %d
Multiple uses for byte %d of page %d
Fragmentation of %d bytes reported as %d on page %d
Page %d is never used
Pointer map page %d is referenced
Outstanding page count goes from %d to %d during this analysis
unknown database %s
keyinfo(%d
%s(%d)
%s-mjXXXXXX9XXz
MJ delete: %s
MJ collide: %s
-mjX9X
foreign key constraint failed
unable to use function %s in the requested context
bind on a busy prepared statement: [%s]
zeroblob(%d)
abort at %d in [%s]: %s
constraint failed at %d in [%s]
cannot open savepoint - SQL statements in progress
no such savepoint: %s
cannot release savepoint - SQL statements in progress
cannot commit transaction - SQL statements in progress
sqlite_temp_master
sqlite_master
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
cannot change %s wal mode from within a transaction
database table is locked: %s
statement aborts at %d: [%s] %s
cannot open value of type %s
cannot open virtual table: %s
cannot open view: %s
no such column: "%s"
foreign key
indexed
cannot open %s column for writing
misuse of aliased aggregate %s
%s: %s.%s.%s
%s: %s.%s
%s: %s
not authorized to use function: %s
%r %s BY term out of range - should be between 1 and %d
too many terms in %s BY clause
Expression tree is too large (maximum depth %d)
variable number must be between ?1 and ?%d
too many SQL variables
too many columns in %s
EXECUTE %s%s SUBQUERY %d
misuse of aggregate: %s()
%.*s"%w"%s
%s%.*s"%w"
%s OR name=%Q
type='trigger' AND (%s)
sqlite_
table %s may not be altered
there is already another table or index with this name: %s
view %s may not be altered
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
sqlite_sequence
UPDATE "%w".sqlite_sequence set name = %Q WHERE name = %Q
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Cannot add a PRIMARY KEY column
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
sqlite_altertab_%s
CREATE TABLE %Q.%s(%s)
DELETE FROM %Q.%s WHERE %s=%Q
SELECT tbl,idx,stat FROM %Q.sqlite_stat1
invalid name: "%s"
too many attached databases - max %d
database %s is already in use
unable to open database: %s
no such database: %s
cannot detach database %s
database %s is locked
%s %T cannot reference objects in database %s
access to %s.%s.%s is prohibited
access to %s.%s is prohibited
object name reserved for internal use: %s
there is already an index named %s
too many columns on %s
duplicate column name: %s
default value of column [%s] is not constant
table "%s" has more than one primary key
AUTOINCREMENT is only allowed on an INTEGER PRIMARY KEY
CREATE %s %.*s
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
CREATE TABLE %Q.sqlite_sequence(name,seq)
view %s is circularly defined
UPDATE %Q.%s SET rootpage=%d WHERE #%d AND rootpage=#%d
sqlite_stat%d
DELETE FROM %Q.sqlite_sequence WHERE name=%Q
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
sqlite_stat
table %s may not be dropped
use DROP TABLE to delete table %s
use DROP VIEW to delete view %s
foreign key on %s should reference only one column of table %T
number of columns in foreign key does not match the number of columns in the referenced table
unknown column "%s" in foreign key definition
indexed columns are not unique
table %s may not be indexed
views may not be indexed
virtual tables may not be indexed
there is already a table named %s
index %s already exists
sqlite_autoindex_%s_%d
table %s has no column named %s
CREATE%s INDEX %.*s
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
no such index: %S
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
a JOIN clause is required before %s
unable to identify the object to be reindexed
no such collation sequence: %s
table %s may not be modified
cannot modify %s because it is a view
foreign key mismatch - "%w" referencing "%w"
table %S has %d columns but %d values were supplied
%d values for %d columns
table %S has no column named %s
%s.%s may not be NULL
constraint %s failed
PRIMARY KEY must be unique
sqlite3_extension_init
unable to open shared library [%s]
no entry point [%s] in shared library [%s]
error during initialization: %s
automatic extension loading failed: %s
foreign_key_list
foreign_key_check
*** in database %s ***
unsupported encoding: %s
malformed database schema (%s)
%s - %s
unsupported file format
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
database schema is locked: %s
unknown or unsupported join type: %T %T%s%T
RIGHT and FULL OUTER JOINs are not currently supported
a NATURAL join may not have an ON or USING clause
cannot have both ON and USING clauses in the same join
cannot join using column %s - column not present in both tables
USE TEMP B-TREE FOR %s
COMPOUND SUBQUERIES %d AND %d %s(%s)
%s.%s
%s:%d
ORDER BY clause should come after %s not before
LIMIT clause should come after %s not before
SELECTs to the left and right of %s do not have the same number of result columns
no such index: %s
sqlite_subquery_%p_
too many references to "%s": max 65535
%s.%s.%s
no such table: %s
SCAN TABLE %s %s%s(~%d rows)
sqlite3_get_table() called with two or more incompatible queries
cannot create %s trigger on view: %S
cannot create INSTEAD OF trigger on table: %S
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')
no such trigger: %S
-- TRIGGER %s
no such column: %s
cannot VACUUM - SQL statements in progress
PRAGMA vacuum_db.synchronous=OFF
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
vtable constructor failed: %s
vtable constructor did not declare schema: %s
no such module: %s
table %s: xBestIndex returned an invalid plan
%s SUBQUERY %d
%s TABLE %s
%s AS %s
%s USING %s%sINDEX%s%s%s
%s USING INTEGER PRIMARY KEY
%s (rowid=?)
%s (rowid>? AND rowid<?)
%s (rowid>?)
%s (rowid<?)
%s VIRTUAL TABLE INDEX %d:%s
%s (~%lld rows)
at most %d tables in a join
cannot use index: %s
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
unknown database: %s
no such %s mode: %s
%s mode not allowed: %s
no such vfs: %s
database corruption at line %d of [%.10s]
misuse at line %d of [%.10s]
cannot open file at line %d of [%.10s]
D:\jenkins\workspace\MT\dca-monitoring\main\dist\Release\dca-monitoring.pdb
InternetCrackUrlW
WinHttpOpenRequest
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpConnect
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
urlmon.dll
WININET.dll
WinHttpCloseHandle
WINHTTP.dll
WinHttpQueryHeaders
NETAPI32.dll
CRYPT32.dll
VERSION.dll
CreatePipe
KERNEL32.dll
EnumWindows
USER32.dll
GDI32.dll
RegOpenKeyW
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyExW
RegNotifyChangeKeyValue
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
ole32.dll
OLEAUT32.dll
SHDeleteKeyW
SHLWAPI.dll
GetCPInfo
zcÁ
.?AVIExecutorTask@@
.?AV?$sp_counted_impl_p@VCChromeActivationCondition@@@detail@boost@@
.?AVCChromeActivationCondition@@
.?AV?$sp_counted_impl_p@VCChromeActivationMethod@@@detail@boost@@
.?AVCChromeActivationMethod@@
.?AV?$sp_counted_impl_p@VCFirefoxSilentActivationMethod@@@detail@boost@@
.?AVCFirefoxSilentActivationMethod@@
.?AV?$sp_counted_impl_p@VCChromeExtensionManager@@@detail@boost@@
.?AVCChromeExtensionManager@@
.?AV?$sp_counted_impl_p@VCFirefoxExtensionManager@@@detail@boost@@
.?AVCFirefoxExtensionManager@@
.?AV?$sp_counted_impl_p@VCHttpHeaders@Http@@@detail@boost@@
.?AVIHttpRequestFactory@@
.?AVCAbstractHttpRequestFactory@@
.?AVCHttpRequestExecutorTask@@
.?AV?$sp_counted_impl_p@VCHttpRequestProvider@@@detail@boost@@
.?AVCHttpRequestProvider@@
.?AV?$sp_counted_impl_p@VCHttpRequestSender@@@detail@boost@@
.?AVIHttpFactory@@
.?AVIExecutorFactory@@
.?AVCHttpRequestSender@@
.?AV?$CAtlExeModuleT@VCModule@@@ATL@@
.?AVIHttpRequestListener@@
.?AVCIeDailyStatusReporterTask@@
.?AV?$_IDispEventLocator@$0IDH@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B@ATL@@
.?AV?$IDispEventSimpleImpl@$0IDH@V?$CUserPromptDialog@$0HNB@$0IDH@@@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B@ATL@@
.?AV?$IDispEventImpl@$0IDH@V?$CUserPromptDialog@$0HNB@$0IDH@@@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B$1?LIBID_SHDocVw@@3U3@B$00$00VCComTypeInfoHolder@ATL@@@ATL@@
.?AV?$sp_counted_impl_p@VCWebInstallService@@@detail@boost@@
.?AVCWebInstallService@@
.?AVCExecutorTaskContext@@
.?AVIExecutorLifecycleListener@@
.?AV?$sp_counted_impl_p@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$vector@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$allocator@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxStartStopComponent@@@detail@boost@@
.?AVCFirefoxStartStopComponent@@
.?AV?$sp_counted_impl_p@UUrlComponents@Http@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeProfileFactory@@@detail@boost@@
.?AVCChromeProfileFactory@@
.?AV?$sp_counted_impl_p@VCFirefoxProfileFactory@@@detail@boost@@
.?AVCFirefoxProfileFactory@@
.?AV?$sp_counted_impl_p@VCHttpUrl@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpRequestData@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCDefaultHttpResultPolicy@@@detail@boost@@
.?AVCDefaultHttpResultPolicy@@
.?AVIHttpResultPolicy@@
.?AV?$sp_counted_impl_p@VCHttpRetryRequest@@@detail@boost@@
.?AVCHttpRetryRequest@@
.?AVIHttpRequest@@
.?AV?$sp_counted_impl_p@VCAsyncHttpSession@@@detail@boost@@
.?AVCExecutorComInitializer@@
.?AVIHttpSession@@
.?AVCAbstractHttpSession@@
.?AVCAsyncHttpSession@@
.?AVCAbstractExecutorTask@@
.?AV?$sp_counted_impl_p@VCWinHttpWrapper@@@detail@boost@@
.?AVCWinHttpWrapper@@
.?AVIHttpWrapper@@
.?AV?$sp_counted_impl_p@VCExecutor@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCSQLiteDB@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCMultiExecutor@@@detail@boost@@
.?AVCMultiExecutor@@
.?AVIExecutor@@
.?AV?$sp_counted_impl_p@VCHttpResponse@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCLocalizationSupport@@@detail@boost@@
.?AVCLocalizationSupport@@
.?AVILocalizationSupport@@
.?AV?$sp_counted_impl_p@V?$map@_WV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@U?$less@_W@std@@V?$allocator@U?$pair@$$CB_WV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@@4@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCRegKey@ATL@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeProfileManager@@@detail@boost@@
.?AVCChromeProfileManager@@
.?AV?$sp_counted_impl_p@VCChromeCookieReader@@@detail@boost@@
.?AVCChromeCookieReader@@
.?AV?$sp_counted_impl_p@VCChromeProfilePreferences@@@detail@boost@@
.?AVCChromeProfilePreferences@@
.?AV?$sp_counted_impl_p@VCChromeExtensionPreferences@@@detail@boost@@
.?AVCChromeExtensionPreferences@@
.?AV?$sp_counted_impl_p@VCFirefoxProfileManager@@@detail@boost@@
.?AVCFirefoxProfileManager@@
.?AV?$sp_counted_impl_p@VCFirefoxCookieReader@@@detail@boost@@
.?AVCFirefoxCookieReader@@
.?AV?$sp_counted_impl_p@VCFirefoxProfilePreferences@@@detail@boost@@
.?AVCFirefoxProfilePreferences@@
.?AV?$sp_counted_impl_p@VCFirefoxExtensionPreferences@@@detail@boost@@
.?AVCFirefoxExtensionPreferences@@
.?AV?$sp_counted_impl_p@VCHttpRequest@@@detail@boost@@
.?AVIHttpRequestStateListener@@
.?AVIHttpErrorStateListener@@
.?AVIHttpStateListener@@
.?AVIHttpHeaderDataListener@@
.?AVIHttpSessionListener@@
.?AVCHttpRequest@@
.?AV?$sp_counted_impl_p@VIHttpSessionConfigurator@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCExecutorLifecycleListeners@@@detail@boost@@
.?AVIExecutorContext@@
.?AVCExecutor@@
.?AV?$sp_counted_impl_p@VCHttpSessionContext@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpHeaderData@@@detail@boost@@
.?AV?$sp_counted_impl_p@U?$pair@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$shared_ptr@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@boost@@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$shared_ptr@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@boost@@@std@@@6@@std@@@detail@boost@@
.?AVCSQLiteDB@@
.?AVISQLiteDB@@
.?AVCSQLiteException@@
.?AV?$sp_counted_impl_p@VCHttpFileRetriever@@@detail@boost@@
.?AVCHttpFileRetriever@@
.?AVIHttpFileRetriever@@
.?AV?$sp_counted_impl_p@VCRegistryKey@@@detail@boost@@
.?AVCSQLiteQuery@@
.?AVCHttpSessionHandleConfigurator@@
.?AVIHttpSessionConfigurator@@
.?AVCHttpConnectionHandleConfigurator@@
.?AVCHttpRequestHandleConfigurator@@
.?AVCHttpSessionProxyConfigurator@@
.?AVCHttpSessionRequestSender@@
.?AVIHttpSessionProcessor@@
.?AVCHttpSessionResponseReciever@@
.?AVCHttpSessionHeaderDataProcessor@@
.?AVCHttpSessionResponseBodyProcessor@@
.?AVCCyclicControl@ExecutorControls@@
.?AVCQueueControl@ExecutorControls@@
.?AVIExecutorControl@@
.?AVCSQLiteTable@@
.?AV?$sp_counted_impl_p@V?$vector@U?$RegistryValue@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@@V?$allocator@U?$RegistryValue@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@@@std@@@std@@@detail@boost@@
012345678
!"#$%&'(
<html xmlns="hXXp://VVV.w3.org/1999/xhtml">
<p><a href="hXXps://VVV.consumerinput.com/">
</a>, <a href="hXXps://VVV.consumerinput.com/privacy_cn">
<p id="paragraph">THANK YOU FOR JOINING CONSUMER INPUT!</p>
<p>The Consumer Input extension is able to identify survey reward opportunities with topics that you would be most likely to qualify for, optimizing your chances to earn rewards!</p>
<p><a href="hXXps://VVV.consumerinput.com/">Learn More</a>, <a href="hXXps://VVV.consumerinput.com/privacy">Privacy Policy</a></p>
<p><a href="hXXps://VVV.consumerinput.com/">Saber m
s</a>, <a href="hXXps://VVV.consumerinput.com/privacy_es">Pol
<p id="paragraph">MERCI DE REJOINDRE CONSUMER INPUT!</p>
<p><a href="hXXps://VVV.consumerinput.com/">En savoir plus</a>, <a href="hXXps://VVV.consumerinput.com/privacy_fr">Charte de confidentialit
</a>, <a href="hXXps://VVV.consumerinput.com/privacy">
<p><a href="hXXps://VVV.consumerinput.com/">Daha fazla bilgi</a>, <a href="hXXps://VVV.consumerinput.com/privacy">Gizlilik Politikas
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
9(9,90949
9$:(:,:0:
0%0U0d0
11K1d1
6$6(6,6064686<6@6\6
6|7b7
6y7@7_7
? ?$?(?,?
7'7~70979
5#5'5 5/535@5
%0U0z0
7 7$7(7,7074787<7
4 4$4(4,4044484<4@4
9 9$9(9,9094989
? ?$?(?,?0?4?8?
9 9$9(9,9094989<9@9
2 2$2(2,2
: :$:(:,:
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
mscoree.dll
WUSER32.DLL
888816666554443
6666554443
!6666554443
ScrollView::Viewport
CI Chrome Install Notice
"%s" --new-window "%s"
?userId=%s&panelId=%s
hXXp://VVV.consumerinput.com/panel/install/thanks/
Juser32.dll
Global\{0DEADC47-D43F-4344-BB79-C87769BEFA87}
Global\{B50E68E0-857A-4E5B-B398-434489C6B3B4}
%s/0/0/%s/0/%s/NOSUBUSERID/0
Software\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer
Software\Microsoft\Windows\Shell\Associations\UrlAssociations
\http\UserChoice\ProgId
\https\UserChoice\ProgId
http\shell\open\command\
postinstallUrl
We were not able to close %s. Please close all %s windows and dialog boxes and click 'OK' to try again or 'Cancel' to abort uninstallation.
hXXps://sddcs.consumerinput.com/EClick
source=%s&event=%s&info=%s<=%s&cimtMachineID=%s
WEB_INSTALL_PAGE_OPEN
CIMT="%s", DCA="%s", enabled="%s", installType="%s", registeredInOmaha="%s", registeredInBrowser="%s", browser="%s", installTime="%s", activationTime="%s", profile="%s"
DCA="%s", %s="%s"
OS="%s", CIMT="%s", DCA="%s", status="%s"
%s web-install triggered, opening "%s"... profile="%s"
%s: %s set for '%s', profile="%s"
OS="%s", CIMT="%s", Omaha="%s", WinUser="%s", CIMIUninstaller="%s", EPM="%s", defaultBrowser="%s"
IE="%d", metroIE="%d", FF="%d", CR ="%d", metroCR="%d"
IsBhoRegistered="%s", IsEnabledViaPolicy="%s", IsExtensionApproved="%s", IsExtensionDisabled="%s", AutoEnableNewAddons="%s", AllowThirdpartyBrowserExtension="%s", ExtensionStatusChangeDisabled="%s", StatusInAddonList="%s", DenyAllAddons="%s"
lastStatusReportTime
lastCookieReportTime
questionmarket.com
insightexpressai.com
lastLifetimeReportTime
%sLastNotificationDisplayTime
%sDisableNotifications
failed, unsupported browser version
failed, operation has timed out
failed, UI Automation not supported
hXXp://auto.ria.com/search/?target=search&event=little&category_id=1&bodystyle[0]=7&chooseTypeSearchAuto=oldAutos&marka=0&model=0&state=0&s_yers=0&po_yers=0&price_ot=200000&price_do=¤cy=1#bodystyle[0]=7&countpage=10&category_id=1&view_type_id=0&page=0&marka=0&model=0&s_yers=0&po_yers=0&state=0&city=0&price_ot=200000&price_do=¤cy=1&gearbox=0&type=0&drive_type=0&door=0&color=0&metallic=0&engineVolumeFrom=&engineVolumeTo=&raceFrom=&raceTo=&powerFrom=&powerTo=&power_name=1&fuelRateFrom=&fuelRateTo=&fuelRatesType=city&custom=0&damage=0&saledParam=0&under_credit=0&confiscated_car=0&auto_repairs=0&with_exchange=0&with_real_exchange=0&exchangeTypeId=0&with_photo=0&with_video=0&is_hot=0&vip=0&checked_auto_ria=0&top=0&order_by=3&hide_black_list=0&auto_id=&auth=0&deletedAutoSearch=0&user_id=0&scroll_to_auto_id=0&expand_search=0&can_be_checked=0&last_auto_id=0&matched_country=-1&seatsFrom=&seatsTo=&wheelFormulaId=0&axleId=0&carryingTo=&carryingFrom=&search_near_states=0&company_id=0&company_type=0
hXXps://VVV.consumerinput.com/installprompt/dca/chrome/?panelId=%s
%s %s
application/x-www-form-urlencoded; charset=UTF-8
A%s;%s
%Y%m%d
{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}
Software\Microsoft\Windows\CurrentVersion\Ext\
Global\Install_%s_{D96CB9E8-13F9-46F9-9320-1CBE7C92AA57}
%s=%s
consumerinput.com
SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Chrome
chrome.exe
Chrome_WidgetWin_1
\Google\Chrome\User Data\
hXXps://VVV.consumerinput.com/uninstall/chromeweb/?id=faoigfclahgbjjjaopddafnnapmeppnc
To completely uninstall the Consumer Input software, you must remove the Consumer Input extension from your Google Chrome browser.
Please follow the instructions below to remove the Chrome extension:
1. From the Chrome window, click on the customize button (the "wrench" icon or the three horizontal bars in the top right corner of the browser)
profile.info_cache
.%s.name
profile.last_used
profile.info_cache.%s.shortcut_name
extensions.known_disabled
extensions.settings.%s
.state
.ack_external
.disable_reasons
.from_webstore
Firefox
firefox.exe
MozillaWindowClass
\Mozilla\Firefox\
profiles.ini
extensions.sqlite
extensions.json
prefs.js
extensions.ciff.dca.panelID
extensions.ciff.dca.userID
extensions.ciff.machineID
extensions.ciff.version
extensions.ciff.dca.version
extensions.ciff.dca.installTime
user_pref\("%s", ?"([\w\{\}\.-] )"\);
extensions.ini
cookies.sqlite
iexplore.exe
dcabho.Dca
Software\Microsoft\Windows\CurrentVersion\Policies\Ext
ListBox_Support_CLSID
{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}
{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}
{1138A907-2253-45d6-99C1-843A0AC58730}
{49C47E46-0DD3-4BCD-AF91-A14C104BD9DE}
{C7B061F6-380E-4545-86E3-400E3156FD28}
0.0.0.0
software\mozilla\Mozilla Firefox
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
CKERNEL32.DLL
dwmapi.dll
hXXp://
SOFTWARE\Microsoft\Windows NT\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\App Paths\
Advapi32.dll
$1"%d".$2
C%s_timer
%s_cancelEvent
C%s: %s
CHTTP/1.1
C0xx
Dbghelp.dll
Cres://%s/%d
%s %s.%d (%s).dmp
CSELECT encrypted_value FROM cookies WHERE name = '%s' and host_key = '.%s'
SELECT name, encrypted_value FROM cookies WHERE host_key = '.%s'
\Local Storage\chrome-extension_%s_0.localstorage
(%s)|(%s)
(%s)|(%s)|(%s)
%s_%s
SELECT value FROM moz_cookies WHERE name = '%s' AND host = '.%s'
SELECT name, value FROM moz_cookies WHERE host = '.%s'
C%s\%s
\StringFileInfo\xx\%s
E%s%scookie-retriever.exe
%s -r %s
%s -a
%s -w %s %s
%s -d %s
%s; expires=%s
SELECT count(*) FROM addon WHERE id = '%s'
SELECT count(*) FROM addon WHERE id = '%s' AND visible = 1 AND active = 1
SELECT count(*) FROM addon WHERE id = '%s' AND location NOT LIKE '%%winreg-app%%' AND visible = 1
SELECT descriptor FROM addon WHERE id = '%s' AND location LIKE '%%winreg-app%%'
UPDATE addon SET active = 1, userDisabled = 0, appDisabled = 0, softDisabled = 0 WHERE id = '%s' AND location LIKE '%%winreg-app%%'
.%s.id
.active
.visible
.location
.descriptor
.userDisabled
.appDisabled
.softDisabled
SQLITE_OK
SQLITE_ERROR
SQLITE_INTERNAL
SQLITE_PERM
SQLITE_ABORT
SQLITE_BUSY
SQLITE_LOCKED
SQLITE_NOMEM
SQLITE_READONLY
SQLITE_INTERRUPT
SQLITE_IOERR
SQLITE_CORRUPT
SQLITE_NOTFOUND
SQLITE_FULL
SQLITE_CANTOPEN
SQLITE_PROTOCOL
SQLITE_EMPTY
SQLITE_SCHEMA
SQLITE_TOOBIG
SQLITE_CONSTRAINT
SQLITE_MISMATCH
SQLITE_MISUSE
SQLITE_NOLFS
SQLITE_AUTH
SQLITE_FORMAT
SQLITE_RANGE
SQLITE_ROW
SQLITE_DONE
CPPSQLITE_ERROR
%s[%d]: %s
%Program Files%\Consumer Input\Monitoring\dca-monitoring.exe
{8856F961-340A-11D0-A96B-00C04FD705A2}
9.9.9.9
dca-monitoring.exe
3.2.0.734


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    nsb7.tmp:1944
    nscA.tmp:1864
    ConsumerInputUpdate.exe:1216
    ConsumerInputUpdate.exe:600
    ConsumerInputUpdate.exe:1600
    ConsumerInputUpdate.exe:1968
    ConsumerInputUpdate.exe:548
    ConsumerInputUpdate.exe:1576
    ciff-3.2.0-12099.exe:1328
    %original file name%.exe:1360

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\%current user%\Local Settings\Temp\nscA.tmp (16088 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nso6.tmp\System.dll (11 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nso6.tmp\UAC.dll (18 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsb7.tmp (28693 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nso6.tmp\nsis_plugin.dll (24853 bytes)
    %Program Files%\Consumer Input\CIuninstall.ico (26 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsm9.tmp\UAC.dll (18 bytes)
    %Program Files%\Consumer Input\CIuninstall.exe (23955 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdateHelper.msi (45 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdate.exe (105 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputCrashHandler.exe (105 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdateBroker.exe (60 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUTC.tmp (9606 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_en.dll (28 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_es-419.dll (29 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_ja.dll (25 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_fr.dll (31 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_de.dll (31 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\psmachine.dll (158 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdate.dll (1990 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\psuser.dll (158 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\ConsumerInputUpdateOnDemand.exe (60 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_zh-CN.dll (22 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GUMB.tmp\goopdateres_es.dll (31 bytes)
    %WinDir%\Temp\Tar19.tmp (2712 bytes)
    %System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (48 bytes)
    %System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
    %WinDir%\Temp\Cab14.tmp (54 bytes)
    %Program Files%\Consumer Input\Update\Install\{2CFD99BD-E566-4B5A-A6F2-E4574B50882A}\ciff-3.2.0-12099.exe (10177 bytes)
    %Program Files%\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0\ciff-3.2.0-12099.exe (10177 bytes)
    %WinDir%\Temp\Tar15.tmp (2712 bytes)
    %System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
    %WinDir%\Temp\Cab18.tmp (48 bytes)
    %System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
    %WinDir%\Temp\Cab12.tmp (54 bytes)
    %WinDir%\Temp\Tar13.tmp (2712 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateHelper.msi (45 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_en.dll (28 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll (5873 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\C3E814D1CB223AFCD58214D14C3B7EAB (220 bytes)
    %WinDir%\Tasks\ConsumerInputUpdateTaskMachineUA.job (952 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdate.exe (601 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_ja.dll (25 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\8BD11C4A2318EC8E5A82462092971DEA (477 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\40C68D5626484A90937F0752C8B950AB (533 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_zh-CN.dll (22 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\40C68D5626484A90937F0752C8B950AB (160 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe (60 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe (60 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es-419.dll (29 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\ECF3006D44DA211141391220EE5049F4 (140 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll (673 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputCrashHandler.exe (601 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\C3E814D1CB223AFCD58214D14C3B7EAB (341 bytes)
    %WinDir%\Tasks\ConsumerInputUpdateTaskMachineCore.job (948 bytes)
    %Program Files%\Consumer Input\Update\ConsumerInputUpdate.exe (601 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\ECF3006D44DA211141391220EE5049F4 (7 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\psuser.dll (673 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\8BD11C4A2318EC8E5A82462092971DEA (208 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_de.dll (31 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_fr.dll (31 bytes)
    %Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es.dll (31 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CabE.tmp (54 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (48 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\Cab10.tmp (54 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\Tar11.tmp (2712 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\Cab16.tmp (48 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\Tar17.tmp (2712 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TarF.tmp (2712 bytes)
    %Program Files%\Consumer Input\Firefox\uninstall.exe (22701 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp\nsis_plugin.dll (20162 bytes)
    %Program Files%\Consumer Input\Firefox\uninstall.ico (26 bytes)
    %Program Files%\Consumer Input\Firefox\ciff-3.2.0-12099.xpi (10311 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp\UAC.dll (18 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nst1C.tmp\System.dll (11 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsx3.tmp (43 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\System.dll (11 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\inetc.dll (20 bytes)
    %Documents and Settings%\%current user%\Cookies\index.dat (388 bytes)
    %Documents and Settings%\%current user%\Cookies\Current_User@histats[1].txt (199 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YDU7W123\0[1].gif (43 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsc4.tmp (109915 bytes)

  4. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  5. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now