Trojan-Downloader.Win32.Genome.vske (Kaspersky), Trojan.Win32.Alureon.FD, Trojan.Win32.Swrort.3.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)Behaviour: Trojan-Downloader, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: a12fc20ab566fd97a9c74c48256a6a0f
SHA1: 585260beb2c537b727a7912ed6ae8e9d300f57c3
SHA256: 46155042055cad9662c84ad76973132f73eb1edcd653ca11b18cb1765a4b2ceb
SSDeep: 1536:VoLDYsacy7mHMowHjXJ78QYHItJv7Rrr5mu:VoPyys5jXJ7TYHItJr1
Size: 68888 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2009-12-06 00:50:35
Analyzed on: WindowsXP SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
dca-monitoring.exe:1556
dca-host.exe:3940
nsp5.tmp:1284
cimt-3.2.1-1112.exe:1952
nss8.tmp:1224
ciff-3.2.0-12191.exe:3260
ConsumerInputUpdate.exe:876
ConsumerInputUpdate.exe:1648
ConsumerInputUpdate.exe:1088
ConsumerInputUpdate.exe:2000
ConsumerInputUpdate.exe:236
ConsumerInputUpdate.exe:348
ciie-3.2.0-12413.exe:3932
nsoB.tmp:1900
%original file name%.exe:944
schtasks.exe:1616
schtasks.exe:652
The Trojan injects its code into the following process(es):No processes have been created.
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process nsp5.tmp:1284 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp\nsis_plugin.dll (22931 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsoB.tmp (16088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp\UAC.dll (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss8.tmp (26165 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp\System.dll (11 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp\nsis_plugin.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsoB.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsc6.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss8.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp\UAC.dll (0 bytes)
The process cimt-3.2.1-1112.exe:1952 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\Consumer Input\Monitoring\cinm-host.exe (6524 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\ns25.tmp (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\KillProcDLL.dll (1568 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\nsExec.dll (6 bytes)
%Program Files%\Consumer Input\Monitoring\uninstall.exe (25018 bytes)
%Program Files%\Consumer Input\Monitoring\uninstall.ico (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\ns24.tmp (6 bytes)
%Program Files%\Consumer Input\Monitoring\cookie-retriever.exe (4066 bytes)
%Program Files%\Consumer Input\Monitoring\manifest.json (726 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\UAC.dll (18 bytes)
%WinDir%\Tasks\CIMT_daily_S-1-5-21-1844237615-1960408961-1801674531-1003.job (464 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\nsis_plugin.dll (26100 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp (4 bytes)
%Program Files%\Consumer Input\Monitoring\dca-monitoring.exe (25963 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Consumer Input Monitoring Tool_SID.dat (46 bytes)
%WinDir%\Tasks\CIMT_S-1-5-21-1844237615-1960408961-1801674531-1003.job (498 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\ns25.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\KillProcDLL.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\nsExec.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\ns24.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\UAC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\nsis_plugin.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Consumer Input Monitoring Tool_SID.dat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy22.tmp (0 bytes)
The process nss8.tmp:1224 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nstA.tmp\UAC.dll (18 bytes)
%Program Files%\Consumer Input\CIuninstall.ico (26 bytes)
%Program Files%\Consumer Input\CIuninstall.exe (23268 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsd9.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nstA.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nstA.tmp\UAC.dll (0 bytes)
The process ciff-3.2.0-12191.exe:3260 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\Consumer Input\Firefox\uninstall.exe (23720 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp\UAC.dll (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp\System.dll (11 bytes)
%Program Files%\Consumer Input\Firefox\ciff-3.2.0-12191.xpi (13701 bytes)
%Program Files%\Consumer Input\Firefox\uninstall.ico (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp\nsis_plugin.dll (24778 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp\nsis_plugin.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp\UAC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsu1C.tmp (0 bytes)
The process ConsumerInputUpdate.exe:1648 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Cab11.tmp (54 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CabF.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar14.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (50 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar12.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar10.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab13.tmp (50 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Cab11.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CabF.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab13.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar12.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar10.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar14.tmp (0 bytes)
The process ConsumerInputUpdate.exe:1088 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateHelper.msi (45 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_en.dll (28 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll (5873 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\C3E814D1CB223AFCD58214D14C3B7EAB (220 bytes)
%WinDir%\Tasks\ConsumerInputUpdateTaskMachineUA.job (952 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdate.exe (601 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_ja.dll (25 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\8BD11C4A2318EC8E5A82462092971DEA (477 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\40C68D5626484A90937F0752C8B950AB (533 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_zh-CN.dll (22 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\40C68D5626484A90937F0752C8B950AB (160 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe (60 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe (60 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es-419.dll (29 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\ECF3006D44DA211141391220EE5049F4 (140 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll (673 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputCrashHandler.exe (601 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\C3E814D1CB223AFCD58214D14C3B7EAB (341 bytes)
%WinDir%\Tasks\ConsumerInputUpdateTaskMachineCore.job (948 bytes)
%Program Files%\Consumer Input\Update\ConsumerInputUpdate.exe (601 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\ECF3006D44DA211141391220EE5049F4 (14 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\psuser.dll (673 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\8BD11C4A2318EC8E5A82462092971DEA (208 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_de.dll (31 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_fr.dll (31 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es.dll (31 bytes)
The process ConsumerInputUpdate.exe:348 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\Temp\Cab17.tmp (54 bytes)
%Program Files%\Consumer Input\Update\Download\{1138A907-2253-45D6-99C1-843A0AC58730}\0.0.0.0\ciie-3.2.0-12413.exe (41656 bytes)
%WinDir%\Temp\Cab19.tmp (50 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (50 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%WinDir%\Temp\Tar18.tmp (2712 bytes)
%WinDir%\Temp\Tar1A.tmp (2712 bytes)
%Program Files%\Consumer Input\Update\Install\{C55CC93B-BB61-43A1-BE77-46298561FE42}\ciie-3.2.0-12413.exe (41656 bytes)
%Program Files%\Consumer Input\Update\Install\{F2C6AE88-75B0-48AD-9BBC-CC350A4EC8ED}\cimt-3.2.1-1112.exe (15278 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Program Files%\Consumer Input\Update\Download\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}\0.0.0.0\cimt-3.2.1-1112.exe (15278 bytes)
%Program Files%\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0\ciff-3.2.0-12191.exe (10815 bytes)
%WinDir%\Temp\Cab15.tmp (54 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%WinDir%\Temp\Tar16.tmp (2712 bytes)
%Program Files%\Consumer Input\Update\Install\{278A5663-5CB1-43E8-9813-FFB38DFBE96B}\ciff-3.2.0-12191.exe (10815 bytes)
The Trojan deletes the following file(s):
%WinDir%\Temp\Cab17.tmp (0 bytes)
%WinDir%\Temp\Cab19.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\{04380899-E41B-4C83-8D43-D3120DAB19E0}-cimt-3.2.1-1112.exe (0 bytes)
%Program Files%\Consumer Input\Update\Install (0 bytes)
%WinDir%\Temp\Tar18.tmp (0 bytes)
%WinDir%\Temp\Tar1A.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\{DAF18439-2FD1-4128-AA7E-1916434C2AAE}-ciie-3.2.0-12413.exe (0 bytes)
%WinDir%\Temp\Cab15.tmp (0 bytes)
%WinDir%\Temp\Tar16.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\{E975D825-E668-4EBA-96D7-79F2038C427E}-ciff-3.2.0-12191.exe (0 bytes)
The process ciie-3.2.0-12413.exe:3932 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\Consumer Input\InternetExplorer\dca-host.exe (27903 bytes)
%Program Files%\Consumer Input\InternetExplorer\dca.js (18506 bytes)
%Program Files%\Consumer Input\InternetExplorer\uninstall.log (844 bytes)
%Program Files%\Consumer Input\InternetExplorer\uninstall.ico (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp\nsis_plugin.dll (26100 bytes)
%Program Files%\Consumer Input\InternetExplorer\cookie-retriever.exe (4042 bytes)
%Program Files%\Consumer Input\InternetExplorer\mozjs185-1.0.dll (47540 bytes)
%Program Files%\Consumer Input\InternetExplorer\dca-bho.dll (22734 bytes)
%Program Files%\Consumer Input\InternetExplorer\uninstall.exe (46579 bytes)
%Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll (19305 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp\UAC.dll (18 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp\UAC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr1F.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp\nsis_plugin.dll (0 bytes)
The process nsoB.tmp:1900 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateHelper.msi (45 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_en.dll (28 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_fr.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUTD.tmp (9606 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_de.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputCrashHandler.exe (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdate.exe (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psuser.dll (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdate.dll (1990 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es-419.dll (29 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_ja.dll (25 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_zh-CN.dll (22 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psmachine.dll (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateOnDemand.exe (60 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateBroker.exe (60 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateHelper.msi (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUTD.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_en.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_fr.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_de.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputCrashHandler.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdate.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psuser.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdate.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es-419.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_ja.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_zh-CN.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psmachine.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateOnDemand.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateBroker.exe (0 bytes)
The process %original file name%.exe:944 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\PQIJTZ4N\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Q3YTPN1X\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\47P62KHJ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso4.tmp\inetc.dll (784 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsp5.tmp (117794 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XP85A2LM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (400 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsj2.tmp (4984 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@histats[1].txt (201 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\47P62KHJ\0[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso3.tmp (43 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nst1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso4.tmp\inetc.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso3.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso4.tmp (0 bytes)
Registry activity
The process dca-monitoring.exe:1556 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DA 84 4A E1 92 20 9C 4E 02 B9 E0 9E 6E 20 91 F6"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Compete\Monitoring]
"lastLifetimeReportTime" = "1443924478"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Compete\Monitoring]
"lastCookieReportTime" = "1443924478"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The process dca-host.exe:3940 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCR\DcaHost.DcaHost.1\CLSID]
"(Default)" = "{7D87094D-49E1-4C72-8C9E-3D937A119BE5}"
[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\TypeLib\{294BC5A4-7157-4131-AB81-1DEC393D0F0A}\1.0]
"(Default)" = "DcaHost 1.0 Type Library"
[HKCR\AppID\dca-host.exe]
"AppID" = "{D5FA0C65-08BE-4F86-B30F-2E285694863A}"
[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\dca-host.exe"
[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}\TypeLib]
"Version" = "1.0"
[HKCR\DcaHost.DcaHost]
"(Default)" = "DcaHost Class"
[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}]
"(Default)" = "IDcaHostSink"
[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"AppID" = "{D5FA0C65-08BE-4F86-B30F-2E285694863A}"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"Policy" = "3"
[HKCR\TypeLib\{294BC5A4-7157-4131-AB81-1DEC393D0F0A}\1.0\FLAGS]
"(Default)" = "0"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"AppPath" = "%Program Files%\Consumer Input\InternetExplorer"
[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}\TypeLib]
"(Default)" = "{294BC5A4-7157-4131-AB81-1DEC393D0F0A}"
[HKCR\AppID\{D5FA0C65-08BE-4F86-B30F-2E285694863A}]
"(Default)" = "dca-host"
[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}\VersionIndependentProgID]
"(Default)" = "DcaHost.DcaHost"
[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}\TypeLib]
"(Default)" = "{294BC5A4-7157-4131-AB81-1DEC393D0F0A}"
[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}\ProgID]
"(Default)" = "DcaHost.DcaHost.1"
[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{E98F6ADA-0655-45F4-9141-9F7A18C5B46B}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\TypeLib\{294BC5A4-7157-4131-AB81-1DEC393D0F0A}\1.0\0\win32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\dca-host.exe"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "83 BF 98 4C 9B 9A 7B 2D 1F 43 A3 3E D6 39 09 4D"
[HKCR\DcaHost.DcaHost\CurVer]
"(Default)" = "DcaHost.DcaHost.1"
[HKCR\CLSID\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"(Default)" = "DcaHost Class"
[HKCR\DcaHost.DcaHost.1]
"(Default)" = "DcaHost Class"
[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}]
"(Default)" = "IDcaHost"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5}]
"AppName" = "dca-host.exe"
[HKCR\TypeLib\{294BC5A4-7157-4131-AB81-1DEC393D0F0A}\1.0\HELPDIR]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer"
[HKCR\Interface\{06306AA5-80A1-4260-A9A3-A8E10F6AA8B7}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\DcaHost.DcaHost\CLSID]
"(Default)" = "{7D87094D-49E1-4C72-8C9E-3D937A119BE5}"
The process nsp5.tmp:1284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\ConsumerInput\Common]
"InstallInfo" = "1{}"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"pv" = "0.0.0.0"
[HKLM\SOFTWARE\ConsumerInput\Common]
"captureType" = "22"
"postinstallUrl" = "1"
"openPostInstallPage" = "0true"
[HKCU\Software\Compete\PartnerData]
"notifyPartner" = "0true"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\ConsumerInput\Common]
"Installed" = "2015.10.04 5:07:14"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"lang" = "en"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"pv" = "0.0.0.0"
[HKLM\SOFTWARE\ConsumerInput\Common]
"supresspostinstall" = "0false"
"disableUninstallDlg" = "false"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"client" = "spruce000|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\CompeteInc]
"MachineID" = "{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
[HKLM\SOFTWARE\ConsumerInput\Common]
"UserSID" = "S-1-5-21-1844237615-1960408961-1801674531-1003"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\ConsumerInput\Common]
"panelid" = "1spruce000"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\ConsumerInput\Common]
"installCR" = "1"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"lang" = "en"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Compete\PartnerData]
"partnerUrl" = "1http://www.moztweak.com/api/postback/?CID=1317&d=1"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"client" = "spruce000|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
[HKLM\SOFTWARE\ConsumerInput\Common]
"panelistid" = "1SPRP1317DDB76A176805954962A76C04FBAA130879"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"lang" = "en"
[HKLM\SOFTWARE\ConsumerInput\Common]
"UserAppDataLocal" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\ConsumerInput\Common]
"InstallationType" = "CIMI"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"pv" = "0.0.0.0"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5B A1 F1 FA 9D 55 F4 88 72 6A 16 66 DC 93 F9 D8"
[HKLM\SOFTWARE\ConsumerInput\Common]
"eulaVersion" = "120140910"
"UserAppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"client" = "spruce000|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"Name" = "Consumer Input Firefox Extension"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"Name" = "Consumer Input Internet Explorer Extension"
[HKLM\SOFTWARE\ConsumerInput\Common]
"lang" = "1en"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"Name" = "Consumer Input Monitoring Tool"
The process cimt-3.2.1-1112.exe:1952 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E7 9D DF BC F5 30 48 6A 7F 9C 63 6D C9 76 DC 18"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.compete.cinm]
"(Default)" = "%Program Files%\Consumer Input\Monitoring\manifest.json"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Products\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"InstallDir" = "%Program Files%\Consumer Input\Monitoring"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"client" = "spruce000|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"pv" = "3.2.1.1112"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Products\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"UninstallPath" = "%Program Files%\Consumer Input\Monitoring\uninstall.exe /S"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"lang" = "en"
"Name" = "Consumer Input MT"
The Trojan deletes the following value(s) in system registry:
The Trojan disables automatic startup of the application by deleting the following autorun value:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Consumer Input Monitoring Tool"
The process nss8.tmp:1224 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "85 7D 9B 7B 0D F7 FD 46 B0 D8 04 21 95 64 F6 65"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer]
"NoRepair" = "1"
"NoModify" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{0ABC687F-FA5B-481F-879D-EBE9DD6CF8DD}]
"pv" = "3.2.4.4285"
"Name" = "Consumer Input Uninstaller Update"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer]
"DisplayIcon" = "%Program Files%\Consumer Input\CIuninstall.ico"
"Publisher" = "Compete Inc."
"DisplayName" = "Consumer Input (remove only)"
"InstallLocation" = "%Program Files%\Consumer Input"
"UninstallString" = "%Program Files%\Consumer Input\CIuninstall.exe"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{0ABC687F-FA5B-481F-879D-EBE9DD6CF8DD}]
"lang" = "en"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{0ABC687F-FA5B-481F-879D-EBE9DD6CF8DD}]
"client" = "spruce000|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
The process ciff-3.2.0-12191.exe:3260 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5E B4 7E A0 B2 23 F3 D3 72 53 3B 2C 97 3F EE 95"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Products\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"InstallDir" = "%Program Files%\Consumer Input\Firefox"
"InstallTime" = "1443924464"
"UninstallPath" = "%Program Files%\Consumer Input\Firefox\uninstall.exe /S"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Mozilla\Firefox\Extensions]
"ConsumerInput@Compete" = "%Program Files%\Consumer Input\Firefox\ciff-3.2.0-12191.xpi"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"Name" = "Consumer Input FF"
"lang" = "en"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"client" = "spruce000fox|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"pv" = "3.2.0.12191"
The process ConsumerInputUpdate.exe:876 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 AD 73 2E AD C7 0E 13 08 8D 4D B4 2B 14 AE C3"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"c"
"sk"
[HKLM\SOFTWARE\ConsumerInput\Update]
"eulaaccepted"
The process ConsumerInputUpdate.exe:1648 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0A 32 97 B6 C1 2F BC E4 8D 5A A6 EE F3 8E DF AE"
[HKCU\Software\ConsumerInput\Update\proxy]
"source" = "IE"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"
"c"
The process ConsumerInputUpdate.exe:1088 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 8F 2B F9 90 BE 93 7E FF B8 0E F7 ED 06 40 50"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ConsumerInputUpdate.exe]
"DisableExceptionChainValidation" = "0"
[HKLM\SOFTWARE\ConsumerInput\Update]
"Path" = "%Program Files%\Consumer Input\Update\ConsumerInputUpdate.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Program Files%\Consumer Input\Update]
"ConsumerInputUpdate.exe" = "ConsumerInput Update"
[HKLM\SOFTWARE\ConsumerInput\Update]
"Version" = "1.3.25.309"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"InstallTime" = "1443924444"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"pv" = "1.3.25.309"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"brand" = "GGLS"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"pv" = "1.3.25.309"
"Name" = "ConsumerInput Update"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"client" = "spruce000|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"UpdateAvailableCount"
[HKLM\SOFTWARE\ConsumerInput\Update]
"mi"
"LastChecked"
"eulaaccepted"
"uid"
"ui"
[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}]
"UpdateAvailableSince"
[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"c"
The process ConsumerInputUpdate.exe:2000 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc.1.0\CLSID]
"(Default)" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"
[HKCR\AppID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"ServiceParameters" = "/comsvc"
[HKCR\AppID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"LocalService" = "consumerinput_updatem"
[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebSvc"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc.1.0]
"(Default)" = "ConsumerInput Update Legacy On Demand"
[HKCR\AppID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"(Default)" = "ServiceModule"
[HKCR\ConsumerInputUpdate.Update3WebSvc\CLSID]
"(Default)" = "{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}"
[HKCR\ConsumerInputUpdate.CoreClass\CLSID]
"(Default)" = "{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}"
[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3COMClassService.1.0"
[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}]
"AppID" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"
[HKCR\ConsumerInputUpdate.CoreClass.1]
"(Default)" = "Google Update Core Class"
[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}]
"(Default)" = "ConsumerInputUpdate Update3Web"
[HKCR\ConsumerInputUpdate.Update3COMClassService.1.0]
"(Default)" = "Update3COMClass"
[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassSvc"
[HKCR\ConsumerInputUpdate.Update3WebSvc.1.0\CLSID]
"(Default)" = "{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}"
[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}\ProgID]
"(Default)" = "ConsumerInputUpdate.CoreClass.1"
[HKCR\ConsumerInputUpdate.CoreClass]
"(Default)" = "Google Update Core Class"
[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"AppID" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"
[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"(Default)" = "Update3COMClass"
[HKCR\ConsumerInputUpdate.Update3WebSvc\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3WebSvc.1.0"
[HKCR\ConsumerInputUpdate.Update3WebSvc.1.0]
"(Default)" = "ConsumerInputUpdate Update3Web"
[HKCR\ConsumerInputUpdate.Update3COMClassService\CLSID]
"(Default)" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"
[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CoreClass"
[HKCR\ConsumerInputUpdate.Update3COMClassService]
"(Default)" = "Update3COMClass"
[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"(Default)" = "ConsumerInput Update Legacy On Demand"
[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"AppID" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"
[HKCR\ConsumerInputUpdate.Update3COMClassService.1.0\CLSID]
"(Default)" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"
[HKCR\ConsumerInputUpdate.Update3COMClassService\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3COMClassService.1.0"
[HKCR\CLSID\{3DBBAB3C-4077-4EC4-BF2C-E89C7784846A}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebSvc.1.0"
[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}]
"(Default)" = "Google Update Core Class"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D5 30 16 A0 47 85 06 F1 98 A6 AE 7F C7 F6 72 C3"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc\CLSID]
"(Default)" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc\CurVer]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassSvc.1.0"
[HKCR\AppID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"(Default)" = "ServiceModule"
[HKCR\ConsumerInputUpdate.CoreClass.1\CLSID]
"(Default)" = "{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}"
[HKCR\ConsumerInputUpdate.Update3WebSvc]
"(Default)" = "ConsumerInputUpdate Update3Web"
[HKCR\ConsumerInputUpdate.CoreClass\CurVer]
"(Default)" = "ConsumerInputUpdate.CoreClass.1"
[HKCR\CLSID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3COMClassService"
[HKCR\AppID\ConsumerInputUpdate.exe]
"AppID" = "{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassSvc]
"(Default)" = "ConsumerInput Update Legacy On Demand"
[HKCR\CLSID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}\ProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassSvc.1.0"
[HKCR\AppID\{E3EBCC2D-D239-4CA9-BF77-8DC68381D6CA}]
"LocalService" = "consumerinput_update"
[HKCR\AppID\{D2A19E15-4D23-41F5-8035-E2D730DA691C}]
"ServiceParameters" = "/comsvc"
[HKCR\CLSID\{1AB0B6A3-9BC5-419B-B86D-40FA2998A131}]
"AppID" = "{D2A19E15-4D23-41F5-8035-E2D730DA691C}"
The Trojan deletes the following registry key(s):
[HKCR\AppID\ConsumerInputUpdate.exe]
The process ConsumerInputUpdate.exe:236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCR\Interface\{4F3440C0-EB6A-46F2-94D8-2D74A0D21C5D}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\ConsumerInputUpdate.CoreMachineClass.1]
"(Default)" = "Google Update Core Class"
[HKCR\Interface\{977ED000-4ECA-454D-AEA2-11824E57A043}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{FFA4D25D-8411-40F8-919D-3C4CD94FBD29}\NumMethods]
"(Default)" = "8"
[HKCR\Interface\{37EB1FA3-2181-4EED-8C9F-363068501901}]
"(Default)" = "IAppBundle"
[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"
[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"
[HKCR\ConsumerInputUpdate.Update3WebMachineFallback]
"(Default)" = "ConsumerInputUpdate Update3Web"
[HKCR\Interface\{58AC6DE8-F15B-4C6A-91D7-B8FA6A2F4169}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0]
"(Default)" = "ConsumerInput Update Legacy On Demand"
[HKCR\ConsumerInputUpdate.Update3WebMachine]
"(Default)" = "Google Update Broker Class Factory"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine\CurVer]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachine.1.0"
[HKCR\Interface\{41E3E6E6-3E50-4F6E-A1F8-1E24440BC6F8}]
"(Default)" = "IApp"
[HKCR\Interface\{592DA852-5C4E-49F8-88BC-EA0A893180C6}]
"(Default)" = "ICoCreateAsync"
[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}]
"(Default)" = "ConsumerInputUpdate CredentialDialog"
[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"
[HKCR\Interface\{52C0A3BA-1DE8-477D-91F4-F82D3824C304}]
"(Default)" = "IGoogleUpdate3Web"
[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}\ProgID]
"(Default)" = "ConsumerInputUpdate.ProcessLauncher.1.0"
[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}\InprocHandler32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll"
[HKCR\ConsumerInputUpdate.CoCreateAsync\CLSID]
"(Default)" = "{87A125E5-B663-496F-954E-488A82FAC012}"
[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\ProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachine.1.0"
[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"
[HKCR\Interface\{5E8F3A92-7544-482D-9D34-FFD702697D16}\NumMethods]
"(Default)" = "10"
[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachine"
[HKCR\ConsumerInputUpdate.CoCreateAsync\CurVer]
"(Default)" = "ConsumerInputUpdate.CoCreateAsync.1.0"
[HKCR\Interface\{E3B8A2CD-70B5-49A4-BFD6-0180BE487A4C}]
"(Default)" = "IAppVersionWeb"
[HKCR\Interface\{CCE83B2E-3794-41FC-8179-46BFEA22148A}]
"(Default)" = "IGoogleUpdate"
[HKCR\Interface\{2A142934-F3E4-4D68-A360-3FE35783E849}]
"(Default)" = "IJobObserver"
[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"
[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}]
"(Default)" = "ConsumerInput.OneClickProcessLauncher"
[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachine"
[HKCR\ConsumerInputUpdate.ProcessLauncher]
"(Default)" = "Google Update Process Launcher Class"
[HKCR\ConsumerInputUpdate.CoreMachineClass\CurVer]
"(Default)" = "ConsumerInputUpdate.CoreMachineClass.1"
[HKCR\ConsumerInputUpdate.CoCreateAsync]
"(Default)" = "CoCreateAsync"
[HKCR\Interface\{FA326D8A-B632-4BCE-858E-12271ABAF613}\NumMethods]
"(Default)" = "10"
[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"
[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}\InprocServer32]
"ThreadingModel" = "Both"
[HKCR\Interface\{5A43377F-504A-4FC4-8575-9C98997788BF}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\CLSID\{0E02C3DE-FDA9-4381-99E6-7ED76A518504}\InProcServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll"
[HKCR\Interface\{FFA4D25D-8411-40F8-919D-3C4CD94FBD29}]
"(Default)" = "IRegistrationUpdateHook"
[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CoCreateAsync"
[HKCR\Interface\{2A142934-F3E4-4D68-A360-3FE35783E849}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}]
"(Default)" = "ConsumerInput Update Legacy On Demand"
[HKCR\Interface\{FB3B0E75-E48E-47C4-BA52-57B7F6E38510}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{268205B6-13E6-4FA2-A1EF-84E4E59F3F1B}\NumMethods]
"(Default)" = "6"
[HKCR\Interface\{FA326D8A-B632-4BCE-858E-12271ABAF613}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{58AC6DE8-F15B-4C6A-91D7-B8FA6A2F4169}\NumMethods]
"(Default)" = "10"
[HKCR\ConsumerInput.OneClickProcessLauncherMachine.1.0\CLSID]
"(Default)" = "{F90B8F59-792D-4F5A-97AD-06E83284F9AB}"
[HKCR\Interface\{837641EA-9158-43EE-B2A1-9CEDC5CBD98F}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"
[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachine.1.0"
[HKCR\Interface\{AC992757-3DEC-43C4-8D9D-AA82F8A857E4}]
"(Default)" = "IBrowserHttpRequest2"
[HKCR\Interface\{5A43377F-504A-4FC4-8575-9C98997788BF}\NumMethods]
"(Default)" = "10"
[HKCR\Interface\{CB21D37D-1DD1-444A-AB6A-AE623DF7B4E4}\NumMethods]
"(Default)" = "4"
[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}]
"(Default)" = "Google Update Broker Class Factory"
[HKCR\Interface\{55D12CB4-DA12-43D6-8100-90174ABBB84F}\NumMethods]
"(Default)" = "14"
[HKCR\ConsumerInputUpdate.ProcessLauncher.1.0]
"(Default)" = "Google Update Process Launcher Class"
[HKCR\ConsumerInputUpdate.ProcessLauncher\CLSID]
"(Default)" = "{5CF02202-6278-47EE-9947-C2D0A057EABD}"
[HKCR\Interface\{CB21D37D-1DD1-444A-AB6A-AE623DF7B4E4}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\ConsumerInputUpdate.Update3WebMachine\CLSID]
"(Default)" = "{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}"
[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}]
"(Default)" = "Google Update Process Launcher Class"
[HKCR\Interface\{AC992757-3DEC-43C4-8D9D-AA82F8A857E4}\NumMethods]
"(Default)" = "4"
[HKCR\Interface\{837641EA-9158-43EE-B2A1-9CEDC5CBD98F}\NumMethods]
"(Default)" = "4"
[HKCR\Interface\{268205B6-13E6-4FA2-A1EF-84E4E59F3F1B}]
"(Default)" = "IProcessLauncher"
[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"
[HKCR\ConsumerInputUpdate.CredentialDialogMachine]
"(Default)" = "ConsumerInputUpdate CredentialDialog"
[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\ProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachineFallback.1.0"
[HKCR\Interface\{977ED000-4ECA-454D-AEA2-11824E57A043}\NumMethods]
"(Default)" = "9"
[HKCR\ConsumerInputUpdate.Update3WebMachineFallback.1.0\CLSID]
"(Default)" = "{0C6D49F4-6E41-4632-BE86-F210D5D894BA}"
[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"
[HKCR\ConsumerInputUpdate.Update3WebMachineFallback\CLSID]
"(Default)" = "{0C6D49F4-6E41-4632-BE86-F210D5D894BA}"
[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.Update3WebMachineFallback"
[HKCR\ConsumerInputUpdate.Update3WebMachine.1.0\CLSID]
"(Default)" = "{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}"
[HKCR\Interface\{FA326D8A-B632-4BCE-858E-12271ABAF613}]
"(Default)" = "IPackage"
[HKCR\ConsumerInputUpdate.CredentialDialogMachine\CLSID]
"(Default)" = "{3A40DF53-EB22-49FE-9246-8084403424E7}"
[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}]
"LocalizedString" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-3000"
[HKCR\Interface\{592DA852-5C4E-49F8-88BC-EA0A893180C6}\NumMethods]
"(Default)" = "4"
[HKCR\Interface\{5E8F3A92-7544-482D-9D34-FFD702697D16}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{55D12CB4-DA12-43D6-8100-90174ABBB84F}]
"(Default)" = "IAppWeb"
[HKCR\ConsumerInputUpdate.Update3WebMachineFallback.1.0]
"(Default)" = "ConsumerInputUpdate Update3Web"
[HKCR\ConsumerInput.OneClickProcessLauncherMachine.1.0]
"(Default)" = "ConsumerInput.OneClickProcessLauncher"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CD F2 DC C6 13 CF BA 03 24 53 E2 1D 64 4B 3F EC"
[HKCR\ConsumerInput.OneClickProcessLauncherMachine\CLSID]
"(Default)" = "{F90B8F59-792D-4F5A-97AD-06E83284F9AB}"
[HKCR\ConsumerInputUpdate.CredentialDialogMachine.1.0]
"(Default)" = "ConsumerInputUpdate CredentialDialog"
[HKCR\Interface\{FB3B0E75-E48E-47C4-BA52-57B7F6E38510}]
"(Default)" = "IAppBundleWeb"
[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}]
"(Default)" = "ConsumerInputUpdate Update3Web"
[HKCR\Interface\{592DA852-5C4E-49F8-88BC-EA0A893180C6}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\ConsumerInputUpdate.CoCreateAsync.1.0]
"(Default)" = "CoCreateAsync"
[HKCR\Interface\{7096D298-02B5-4AE9-94E1-C16E27553D17}]
"(Default)" = "IGoogleUpdateCore"
[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CredentialDialogMachine"
[HKCR\Interface\{5A43377F-504A-4FC4-8575-9C98997788BF}]
"(Default)" = "ICoCreateAsyncStatus"
[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}\InprocHandler32]
"ThreadingModel" = "Both"
[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\ProgID]
"(Default)" = "ConsumerInputUpdate.CoreMachineClass.1"
[HKCR\Interface\{C59D48E5-082B-4BB6-9838-BA261C4FBD5C}\NumMethods]
"(Default)" = "24"
[HKCR\Interface\{41E3E6E6-3E50-4F6E-A1F8-1E24440BC6F8}\NumMethods]
"(Default)" = "40"
[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}\ProgID]
"(Default)" = "ConsumerInputUpdate.CredentialDialogMachine.1.0"
[HKCR\Interface\{E3B8A2CD-70B5-49A4-BFD6-0180BE487A4C}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{55D12CB4-DA12-43D6-8100-90174ABBB84F}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{7096D298-02B5-4AE9-94E1-C16E27553D17}\NumMethods]
"(Default)" = "4"
[HKCR\Interface\{FFA4D25D-8411-40F8-919D-3C4CD94FBD29}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\CLSID\{0E02C3DE-FDA9-4381-99E6-7ED76A518504}]
"(Default)" = "PSFactoryBuffer"
[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}\InprocServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine\CLSID]
"(Default)" = "{8AF9C44C-E497-4776-A7EF-F6455F982825}"
[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\Elevation]
"Enabled" = "1"
[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.CoreMachineClass"
[HKCR\ConsumerInputUpdate.CoreMachineClass]
"(Default)" = "Google Update Core Class"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}]
"CLSID" = "{F90B8F59-792D-4F5A-97AD-06E83284F9AB}"
[HKCR\Interface\{2A142934-F3E4-4D68-A360-3FE35783E849}\NumMethods]
"(Default)" = "13"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine.1.0\CLSID]
"(Default)" = "{8AF9C44C-E497-4776-A7EF-F6455F982825}"
[HKCR\Interface\{977ED000-4ECA-454D-AEA2-11824E57A043}]
"(Default)" = "IProgressWndEvents"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback]
"(Default)" = "ConsumerInput Update Legacy On Demand"
[HKCR\ConsumerInputUpdate.ProcessLauncher\CurVer]
"(Default)" = "ConsumerInputUpdate.ProcessLauncher.1.0"
[HKCR\ConsumerInput.OneClickProcessLauncherMachine]
"(Default)" = "ConsumerInput.OneClickProcessLauncher"
[HKCR\Interface\{41E3E6E6-3E50-4F6E-A1F8-1E24440BC6F8}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{37EB1FA3-2181-4EED-8C9F-363068501901}\NumMethods]
"(Default)" = "39"
[HKCR\ConsumerInputUpdate.Update3WebMachineFallback\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3WebMachineFallback.1.0"
[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\Elevation]
"Enabled" = "1"
[HKCR\Interface\{E3B8A2CD-70B5-49A4-BFD6-0180BE487A4C}\NumMethods]
"(Default)" = "10"
[HKCR\Interface\{CCE83B2E-3794-41FC-8179-46BFEA22148A}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}]
"Policy" = "3"
[HKCR\ConsumerInput.OneClickProcessLauncherMachine\CurVer]
"(Default)" = "ConsumerInput.OneClickProcessLauncherMachine.1.0"
[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\Elevation]
"Enabled" = "1"
[HKCR\Interface\{58AC6DE8-F15B-4C6A-91D7-B8FA6A2F4169}]
"(Default)" = "IGoogleUpdate3"
[HKCR\Interface\{4F3440C0-EB6A-46F2-94D8-2D74A0D21C5D}\NumMethods]
"(Default)" = "4"
[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}\Elevation]
"Enabled" = "1"
[HKCR\Interface\{37EB1FA3-2181-4EED-8C9F-363068501901}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{52C0A3BA-1DE8-477D-91F4-F82D3824C304}\NumMethods]
"(Default)" = "8"
[HKCR\Interface\{C59D48E5-082B-4BB6-9838-BA261C4FBD5C}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\CLSID\{0E02C3DE-FDA9-4381-99E6-7ED76A518504}\InProcServer32]
"ThreadingModel" = "Both"
[HKCR\Interface\{CB21D37D-1DD1-444A-AB6A-AE623DF7B4E4}]
"(Default)" = "ICredentialDialog"
[HKCR\CLSID\{8AF9C44C-E497-4776-A7EF-F6455F982825}]
"(Default)" = "Google Update Broker Class Factory"
[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}]
"(Default)" = "Google Update Core Class"
[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}\ProgID]
"(Default)" = "ConsumerInput.OneClickProcessLauncherMachine.1.0"
[HKCR\ConsumerInputUpdate.CoCreateAsync.1.0\CLSID]
"(Default)" = "{87A125E5-B663-496F-954E-488A82FAC012}"
[HKCR\CLSID\{F90B8F59-792D-4F5A-97AD-06E83284F9AB}\VersionIndependentProgID]
"(Default)" = "ConsumerInput.OneClickProcessLauncherMachine"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine]
"(Default)" = "Google Update Broker Class Factory"
[HKCR\Interface\{837641EA-9158-43EE-B2A1-9CEDC5CBD98F}]
"(Default)" = "IGoogleUpdate3WebSecurity"
[HKCR\Interface\{4F3440C0-EB6A-46F2-94D8-2D74A0D21C5D}]
"(Default)" = "IOneClickProcessLauncher"
[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\ProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0"
[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"
[HKCR\Interface\{5E8F3A92-7544-482D-9D34-FFD702697D16}]
"(Default)" = "IAppVersion"
[HKCR\ConsumerInputUpdate.Update3WebMachine\CurVer]
"(Default)" = "ConsumerInputUpdate.Update3WebMachine.1.0"
[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"
[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"
[HKCR\Interface\{268205B6-13E6-4FA2-A1EF-84E4E59F3F1B}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{7096D298-02B5-4AE9-94E1-C16E27553D17}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachine.1.0]
"(Default)" = "Google Update Broker Class Factory"
[HKCR\Interface\{C59D48E5-082B-4BB6-9838-BA261C4FBD5C}]
"(Default)" = "ICurrentState"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0\CLSID]
"(Default)" = "{65BF611F-85CD-4E7F-966C-853573462C14}"
[HKCR\CLSID\{65BF611F-85CD-4E7F-966C-853573462C14}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachineFallback"
[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"
[HKCR\ConsumerInputUpdate.Update3WebMachine.1.0]
"(Default)" = "Google Update Broker Class Factory"
[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\Elevation]
"Enabled" = "1"
[HKCR\Interface\{52C0A3BA-1DE8-477D-91F4-F82D3824C304}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\Interface\{AC992757-3DEC-43C4-8D9D-AA82F8A857E4}\ProxyStubClsid32]
"(Default)" = "{0E02C3DE-FDA9-4381-99E6-7ED76A518504}"
[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}\ProgID]
"(Default)" = "ConsumerInputUpdate.CoCreateAsync.1.0"
[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}]
"(Default)" = "CoCreateAsync"
[HKCR\CLSID\{3A40DF53-EB22-49FE-9246-8084403424E7}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"
[HKCR\Interface\{FB3B0E75-E48E-47C4-BA52-57B7F6E38510}\NumMethods]
"(Default)" = "24"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback\CurVer]
"(Default)" = "ConsumerInputUpdate.OnDemandCOMClassMachineFallback.1.0"
[HKCR\ConsumerInputUpdate.OnDemandCOMClassMachineFallback\CLSID]
"(Default)" = "{65BF611F-85CD-4E7F-966C-853573462C14}"
[HKCR\CLSID\{0C6D49F4-6E41-4632-BE86-F210D5D894BA}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe"
[HKCR\ConsumerInputUpdate.ProcessLauncher.1.0\CLSID]
"(Default)" = "{5CF02202-6278-47EE-9947-C2D0A057EABD}"
[HKCR\ConsumerInputUpdate.CredentialDialogMachine\CurVer]
"(Default)" = "ConsumerInputUpdate.CredentialDialogMachine.1.0"
[HKCR\CLSID\{5CF02202-6278-47EE-9947-C2D0A057EABD}\VersionIndependentProgID]
"(Default)" = "ConsumerInputUpdate.ProcessLauncher"
[HKCR\CLSID\{87A125E5-B663-496F-954E-488A82FAC012}\LocalServer32]
"(Default)" = "%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe"
[HKCR\Interface\{CCE83B2E-3794-41FC-8179-46BFEA22148A}\NumMethods]
"(Default)" = "5"
[HKCR\ConsumerInputUpdate.CoreMachineClass.1\CLSID]
"(Default)" = "{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}"
[HKCR\ConsumerInputUpdate.CredentialDialogMachine.1.0\CLSID]
"(Default)" = "{3A40DF53-EB22-49FE-9246-8084403424E7}"
[HKCR\CLSID\{D4F484EE-BF68-4B61-AB83-C1E0EF88D876}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"
[HKCR\CLSID\{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}\Elevation]
"IconReference" = "@%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll,-1004"
[HKCR\ConsumerInputUpdate.CoreMachineClass\CLSID]
"(Default)" = "{0DC6DC6C-048E-4B03-8F2D-7D6B90571172}"
The Trojan deletes the following registry key(s):
[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}]
[HKCR\CLSID\{1E218D71-6C28-46EE-AC6A-20C95989D566}\InprocHandler32]
[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}\InprocServer32]
[HKCR\CLSID\{D8F06F2A-FDCE-4F12-8D2A-7A97A752CF1A}]
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"
"c"
The process ConsumerInputUpdate.exe:348 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastCheckSuccess" = "1443924477"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\F]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"client" = "spruce000|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"client" = "spruce000|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"InstallTime" = "1443924471"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastCheckSuccess" = "1443924473"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\A]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastCheckSuccess" = "1443924464"
[HKCU\Software\ConsumerInput\Update\proxy]
"source" = "IE"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\D]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"lang" = "en"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"pv" = "0.0.0.0"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"pv" = "0.0.0.0"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"InstallTime" = "1443924464"
"brand" = "GGLS"
"pv" = "0.0.0.0"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"brand" = "GGLS"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"InstallTime" = "1443924475"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "96 EC 27 2C DD 1A 8F FC 49 FE 47 CA D0 DD 4E C2"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"client" = "spruce000|SPRP1317DDB76A176805954962A76C04FBAA130879|{17BE3191-2D60-406F-B3F1-C2C529A34B2D}"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\C]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\75E0ABB6138512271C04F85FDDDE38E4B7242EFE]
"Blob" = "19 00 00 00 01 00 00 00 10 00 00 00 A8 82 7A 3C"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"brand" = "GGLS"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"lang" = "en"
[HKU\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
"ParseAutoexec" = "1"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"lang" = "en"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"tttoken"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientStateMedium\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"eulaaccepted"
[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerExtraCode1"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerResult"
"ap"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastInstallerError"
[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerError"
"LastInstallerResultUIString"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerError"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"UpdateAvailableCount"
"eulaaccepted"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"UpdateAvailableSince"
"UpdateAvailableCount"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"experiment_labels"
[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerSuccessLaunchCmdLine"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerError"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"75E0ABB6138512271C04F85FDDDE38E4B7242EFE"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerSuccessLaunchCmdLine"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerSuccessLaunchCmdLine"
[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"sk"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerExtraCode1"
[HKLM\SOFTWARE\ConsumerInput\Update\network\secure]
"c"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerExtraCode1"
[HKLM\SOFTWARE\ConsumerInput\Update]
"uid"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientStateMedium\{1138A907-2253-45D6-99C1-843A0AC58730}]
"eulaaccepted"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastInstallerSuccessLaunchCmdLine"
"UpdateAvailableSince"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"experiment_labels"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastInstallerExtraCode1"
"LastInstallerResultUIString"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"browser"
"UpdateAvailableSince"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"iid"
"eulaaccepted"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"tttoken"
"iid"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"UpdateAvailableCount"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"browser"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"iid"
"tttoken"
"ap"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{1138A907-2253-45D6-99C1-843A0AC58730}]
"LastInstallerResultUIString"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"LastInstallerResult"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerResult"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientStateMedium\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"eulaaccepted"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"ap"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"experiment_labels"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}]
"browser"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"LastInstallerResultUIString"
[HKLM\SOFTWARE\ConsumerInput\Update]
"LastInstallerResult"
[HKLM\SOFTWARE\ConsumerInput\Update\ClientState\{C7B061F6-380E-4545-86E3-400E3156FD28}]
"eulaaccepted"
The process ciie-3.2.0-12413.exe:3932 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\ProgID]
"(Default)" = "dcabho.Dca.1"
[HKCR\dcabho.Dca.1\CLSID]
"(Default)" = "{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}"
[HKCR\CptUrlPassthru.HttpMonitor]
"(Default)" = "CHttpMonitor Object"
[HKLM\SOFTWARE\ConsumerInput\Products\{1138A907-2253-45D6-99C1-843A0AC58730}]
"InstallTime" = "1443924472"
[HKCR\CptUrlPassthru.HttpMonitor.1]
"(Default)" = "CHttpMonitor Object"
[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\ProgID]
"(Default)" = "CptUrlPassthru.HttpMonitor.1"
[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}\TypeLib]
"Version" = "1.0"
[HKCR\CptUrlPassthru.HttpHeaders.1]
"(Default)" = "CHttpHeadersImpl Object"
[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\TypeLib]
"(Default)" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"
[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\InprocServer32]
"ThreadingModel" = "apartment"
[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\VersionIndependentProgID]
"(Default)" = "CptUrlPassthru.HttpHeaders"
[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\Implemented Categories]
"(Default)" = ""
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"Name" = "Consumer Input IE"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCR\AppID\{DD7C44CC-0F60-4FD9-A38F-5CF30D698AC2}]
"(Default)" = "dcabho"
[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\TypeLib]
"(Default)" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"
[HKCR\AppID\dca-bho.DLL]
"AppID" = "{DD7C44CC-0F60-4FD9-A38F-5CF30D698AC2}"
[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}\TypeLib]
"(Default)" = "{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}"
[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\Implemented Categories\{59fb2056-d625-48d0-a944-1a85b5ab2640}]
"(Default)" = ""
[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\TypeLib\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}\1.0\0\win32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll"
[HKCU\Software\Compete]
"Install_Dir" = "%Program Files%\Consumer Input\InternetExplorer"
[HKCR\CptUrlPassthru.HttpHeaders\CurVer]
"(Default)" = "CptUrlPassthru.HttpHeaders.1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}\TypeLib]
"(Default)" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"
[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\InprocServer32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll"
[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}\TypeLib]
"(Default)" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"
[HKCR\dcabho.Dca]
"(Default)" = "Dca Class"
[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}]
"(Default)" = "Consumer Input DCA BHO"
[HKCR\TypeLib\{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}\1.0]
"(Default)" = "DcaBho 1.0 Type Library"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}]
"AppID" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"
[HKCU\Software\Compete\DCA]
"ExePath" = "Created to make other products detect new dca-bho"
[HKCR\CptUrlPassthru.HttpMonitor\CLSID]
"(Default)" = "{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}"
[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}]
"(Default)" = "IHttpMonitor"
[HKCR\CptUrlPassthru.HttpHeaders]
"(Default)" = "CHttpHeadersImpl Object"
[HKCR\TypeLib\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}\1.0\HELPDIR]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer"
[HKCR\CptUrlPassthru.HttpMonitor\CurVer]
"(Default)" = "CptUrlPassthru.HttpMonitor.1"
[HKCR\dcabho.Dca.1]
"(Default)" = "Dca Class"
[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\InprocServer32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll"
[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\VersionIndependentProgID]
"(Default)" = "CptUrlPassthru.HttpMonitor"
[HKCR\CptUrlPassthru.HttpHeaders.1\CLSID]
"(Default)" = "{82025773-B1B0-497b-B942-0171A2E42C3C}"
[HKCU\Software\Compete\DCA]
"PanelName" = "Consumer Input"
[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}]
"(Default)" = "CHttpHeadersImpl Object"
[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}\ProgID]
"(Default)" = "CptUrlPassthru.HttpHeaders.1"
[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCU\Software\Compete\Monitoring]
"forceCiiePostInstallPage" = "1"
[HKCR\CptUrlPassthru.HttpMonitor.1\CLSID]
"(Default)" = "{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}"
[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}]
"AppID" = "{DD7C44CC-0F60-4FD9-A38F-5CF30D698AC2}"
[HKCR\Interface\{15527BF5-9729-49DC-889C-9F956983154C}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"lang" = "en"
[HKLM\SOFTWARE\ConsumerInput\Products\{1138A907-2253-45D6-99C1-843A0AC58730}]
"UninstallPath" = "%Program Files%\Consumer Input\InternetExplorer\uninstall.exe /S"
"InstallDir" = "%Program Files%\Consumer Input\InternetExplorer"
[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\dcabho.Dca\CurVer]
"(Default)" = "dcabho.Dca.1"
[HKCR\TypeLib\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}\1.0\FLAGS]
"(Default)" = "0"
[HKCR\CLSID\{82025773-B1B0-497b-B942-0171A2E42C3C}]
"AppID" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"
[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\InprocServer32]
"ThreadingModel" = "Apartment"
[HKCR\CptUrlPassthru.HttpHeaders\CLSID]
"(Default)" = "{82025773-B1B0-497b-B942-0171A2E42C3C}"
[HKCR\AppID\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}]
"(Default)" = "CptUrlPassthru"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A0 92 AD 4B DB B0 C2 9F 94 D7 1B 4C B0 6C F5 8F"
[HKCR\Interface\{DD05B915-F77B-474A-9D42-9FEEAF5475C4}]
"(Default)" = "IDcaBho"
[HKCR\AppID\CptUrlPassthru.DLL]
"AppID" = "{A57F7191-1E7F-4852-BAAF-F80A43E2687A}"
[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\VersionIndependentProgID]
"(Default)" = "dcabho.Dca"
[HKCR\dcabho.Dca\CLSID]
"(Default)" = "{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\ConsumerInput\Update\Clients\{1138A907-2253-45D6-99C1-843A0AC58730}]
"pv" = "3.2.0.12413"
[HKCR\TypeLib\{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}\1.0\0\win32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\dca-bho.dll"
[HKCR\Interface\{C015D269-0F4E-4B52-A91F-721F6DAC9437}]
"(Default)" = "IHttpHeaders"
[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\InprocServer32]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer\dca-bho.dll"
[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}]
"(Default)" = "CHttpMonitor Object"
[HKCR\TypeLib\{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}\1.0\FLAGS]
"(Default)" = "0"
[HKCR\CLSID\{60260024-AA48-4A2F-84DA-2C2DCB24AAD0}\InprocServer32]
"ThreadingModel" = "apartment"
[HKCR\TypeLib\{A57F7191-1E7F-4852-BAAF-F80A43E2687A}\1.0]
"(Default)" = "CptUrlPassthru 1.0 Type Library"
[HKCR\TypeLib\{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}\1.0\HELPDIR]
"(Default)" = "%Program Files%\Consumer Input\InternetExplorer"
[HKCR\CLSID\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}\TypeLib]
"(Default)" = "{7BAB653D-88FB-4F60-AFC2-8E6FD59FAFF3}"
It registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every time Internet Explorer is run. It does this by creating the following registry key(s)/entry(ies):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}]
"(Default)" = "DCA"
"NoExplorer" = "1"
The process nsoB.tmp:1900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 03 77 B9 1E CC C7 08 74 7E 11 71 B7 27 18 F3"
The process %original file name%.exe:944 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1A 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1A 00 82 3D 4F 78 B4 FB 0E A4 E4 13 55 CC 53 9C"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process schtasks.exe:1616 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "10 AC 38 ED 1D 86 B3 B1 36 DB 17 AC EA 83 48 57"
The process schtasks.exe:652 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "64 86 89 BE A9 90 4E A4 1D 3A 68 BE 91 11 D2 2D"
Dropped PE files
MD5 | File path |
---|---|
4cf3a81ab4579b30117c8a39a489d51d | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsi7.tmp\System.dll |
0bea21545b130f74ad40160ae8ac05ea | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsi7.tmp\UAC.dll |
ec39f9027310231c2af374e6a2a8f733 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsi7.tmp\nsis_plugin.dll |
a9c69837ec78126315335e6814781730 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsp5.tmp |
3cf748507f4a0eae62906ac7dec93068 | c:\Program Files\Consumer Input\CIuninstall.exe |
f2f06693c1e1b009b8be559551baee15 | c:\Program Files\Consumer Input\Firefox\uninstall.exe |
00a5e194e31d6853ccd384ef844708d0 | c:\Program Files\Consumer Input\InternetExplorer\cookie-retriever.exe |
a9921ebe348c1ee4d20425e479faf46d | c:\Program Files\Consumer Input\InternetExplorer\cpturlpassthru.dll |
c77917ddc253dcdad3e3e559968f5321 | c:\Program Files\Consumer Input\InternetExplorer\dca-bho.dll |
f5e1dfce9585bc9afd2439989143e64a | c:\Program Files\Consumer Input\InternetExplorer\dca-host.exe |
b0bf419c9ec9bad55a70904a9461184f | c:\Program Files\Consumer Input\InternetExplorer\mozjs185-1.0.dll |
076eb3ea15e8b59c1dc03a51b35bfa9e | c:\Program Files\Consumer Input\InternetExplorer\uninstall.exe |
d6d754022717f01a7919c40181b85149 | c:\Program Files\Consumer Input\Monitoring\cinm-host.exe |
bef666043fafb12c4f17982c996792a3 | c:\Program Files\Consumer Input\Monitoring\cookie-retriever.exe |
e73ed31d690fb00f72c84ed1f7af556b | c:\Program Files\Consumer Input\Monitoring\dca-monitoring.exe |
85e046fd828d356eeebd8b9e790dbf24 | c:\Program Files\Consumer Input\Monitoring\uninstall.exe |
7b110c27e90217ff3bd49cef739a2e1d | c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputCrashHandler.exe |
7b110c27e90217ff3bd49cef739a2e1d | c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputUpdate.exe |
14f8e799e11716ce374d42cc6cbf6ede | c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe |
a5f9015e3152964a06cc1fb09421813e | c:\Program Files\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe |
6d0f507eb95e528f4801d7dd8d613c4f | c:\Program Files\Consumer Input\Update\1.3.25.309\goopdate.dll |
5aaf1b0f0275aecbc12f823e75dd2a69 | c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_de.dll |
75e9268adff3a743e9bc0253070fa1fb | c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_en.dll |
8e3f614721e2c5595f589b834a1aad70 | c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_es-419.dll |
190510f059639a91717d5435ee7746b6 | c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_es.dll |
c95a2759959f049e776bc760fac5e401 | c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_fr.dll |
0dcf385404aed30f0e14b855dd8ac347 | c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_ja.dll |
73464572702ac3373953526e5f455a84 | c:\Program Files\Consumer Input\Update\1.3.25.309\goopdateres_zh-CN.dll |
8501135f1cea578e4d279722e25d67d2 | c:\Program Files\Consumer Input\Update\1.3.25.309\psmachine.dll |
2691bb6326ff0ac20f76bc1d3ffe9157 | c:\Program Files\Consumer Input\Update\1.3.25.309\psuser.dll |
7b110c27e90217ff3bd49cef739a2e1d | c:\Program Files\Consumer Input\Update\ConsumerInputUpdate.exe |
5a109eddeb5ccc1f6a7e79559668b36a | c:\Program Files\Consumer Input\Update\Download\{1138A907-2253-45D6-99C1-843A0AC58730}\0.0.0.0\ciie-3.2.0-12413.exe |
bf40b7f06d1b4ae9ace02551be2c8dfc | c:\Program Files\Consumer Input\Update\Download\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}\0.0.0.0\cimt-3.2.1-1112.exe |
a8840f9a1a7138959db252ba17a10d5d | c:\Program Files\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0\ciff-3.2.0-12191.exe |
a8840f9a1a7138959db252ba17a10d5d | c:\Program Files\Consumer Input\Update\Install\{278A5663-5CB1-43E8-9813-FFB38DFBE96B}\ciff-3.2.0-12191.exe |
5a109eddeb5ccc1f6a7e79559668b36a | c:\Program Files\Consumer Input\Update\Install\{C55CC93B-BB61-43A1-BE77-46298561FE42}\ciie-3.2.0-12413.exe |
bf40b7f06d1b4ae9ace02551be2c8dfc | c:\Program Files\Consumer Input\Update\Install\{F2C6AE88-75B0-48AD-9BBC-CC350A4EC8ED}\cimt-3.2.1-1112.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
dca-monitoring.exe:1556
dca-host.exe:3940
nsp5.tmp:1284
cimt-3.2.1-1112.exe:1952
nss8.tmp:1224
ciff-3.2.0-12191.exe:3260
ConsumerInputUpdate.exe:876
ConsumerInputUpdate.exe:1648
ConsumerInputUpdate.exe:1088
ConsumerInputUpdate.exe:2000
ConsumerInputUpdate.exe:236
ConsumerInputUpdate.exe:348
ciie-3.2.0-12413.exe:3932
nsoB.tmp:1900
%original file name%.exe:944
schtasks.exe:1616
schtasks.exe:652 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp\nsis_plugin.dll (22931 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsoB.tmp (16088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp\UAC.dll (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss8.tmp (26165 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi7.tmp\System.dll (11 bytes)
%Program Files%\Consumer Input\Monitoring\cinm-host.exe (6524 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\ns25.tmp (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\KillProcDLL.dll (1568 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\nsExec.dll (6 bytes)
%Program Files%\Consumer Input\Monitoring\uninstall.exe (25018 bytes)
%Program Files%\Consumer Input\Monitoring\uninstall.ico (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\ns24.tmp (6 bytes)
%Program Files%\Consumer Input\Monitoring\cookie-retriever.exe (4066 bytes)
%Program Files%\Consumer Input\Monitoring\manifest.json (726 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\UAC.dll (18 bytes)
%WinDir%\Tasks\CIMT_daily_S-1-5-21-1844237615-1960408961-1801674531-1003.job (464 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsn23.tmp\nsis_plugin.dll (26100 bytes)
%Program Files%\Consumer Input\Monitoring\dca-monitoring.exe (25963 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Consumer Input Monitoring Tool_SID.dat (46 bytes)
%WinDir%\Tasks\CIMT_S-1-5-21-1844237615-1960408961-1801674531-1003.job (498 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nstA.tmp\UAC.dll (18 bytes)
%Program Files%\Consumer Input\CIuninstall.ico (26 bytes)
%Program Files%\Consumer Input\CIuninstall.exe (23268 bytes)
%Program Files%\Consumer Input\Firefox\uninstall.exe (23720 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp\UAC.dll (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp\System.dll (11 bytes)
%Program Files%\Consumer Input\Firefox\ciff-3.2.0-12191.xpi (13701 bytes)
%Program Files%\Consumer Input\Firefox\uninstall.ico (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsk1D.tmp\nsis_plugin.dll (24778 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab11.tmp (54 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CabF.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar14.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (50 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar12.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar10.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab13.tmp (50 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateHelper.msi (45 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_en.dll (28 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdate.dll (5873 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\C3E814D1CB223AFCD58214D14C3B7EAB (220 bytes)
%WinDir%\Tasks\ConsumerInputUpdateTaskMachineUA.job (952 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdate.exe (601 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_ja.dll (25 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\8BD11C4A2318EC8E5A82462092971DEA (477 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\40C68D5626484A90937F0752C8B950AB (533 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_zh-CN.dll (22 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\40C68D5626484A90937F0752C8B950AB (160 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateBroker.exe (60 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputUpdateOnDemand.exe (60 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es-419.dll (29 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\ECF3006D44DA211141391220EE5049F4 (140 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\psmachine.dll (673 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\ConsumerInputCrashHandler.exe (601 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\C3E814D1CB223AFCD58214D14C3B7EAB (341 bytes)
%WinDir%\Tasks\ConsumerInputUpdateTaskMachineCore.job (948 bytes)
%Program Files%\Consumer Input\Update\ConsumerInputUpdate.exe (601 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\ECF3006D44DA211141391220EE5049F4 (14 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\psuser.dll (673 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\8BD11C4A2318EC8E5A82462092971DEA (208 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_de.dll (31 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_fr.dll (31 bytes)
%Program Files%\Consumer Input\Update\1.3.25.309\goopdateres_es.dll (31 bytes)
%WinDir%\Temp\Cab17.tmp (54 bytes)
%Program Files%\Consumer Input\Update\Download\{1138A907-2253-45D6-99C1-843A0AC58730}\0.0.0.0\ciie-3.2.0-12413.exe (41656 bytes)
%WinDir%\Temp\Cab19.tmp (50 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (50 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%WinDir%\Temp\Tar18.tmp (2712 bytes)
%WinDir%\Temp\Tar1A.tmp (2712 bytes)
%Program Files%\Consumer Input\Update\Install\{C55CC93B-BB61-43A1-BE77-46298561FE42}\ciie-3.2.0-12413.exe (41656 bytes)
%Program Files%\Consumer Input\Update\Install\{F2C6AE88-75B0-48AD-9BBC-CC350A4EC8ED}\cimt-3.2.1-1112.exe (15278 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Program Files%\Consumer Input\Update\Download\{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}\0.0.0.0\cimt-3.2.1-1112.exe (15278 bytes)
%Program Files%\Consumer Input\Update\Download\{C7B061F6-380E-4545-86E3-400E3156FD28}\0.0.0.0\ciff-3.2.0-12191.exe (10815 bytes)
%WinDir%\Temp\Cab15.tmp (54 bytes)
%System%\config\systemprofile\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%WinDir%\Temp\Tar16.tmp (2712 bytes)
%Program Files%\Consumer Input\Update\Install\{278A5663-5CB1-43E8-9813-FFB38DFBE96B}\ciff-3.2.0-12191.exe (10815 bytes)
%Program Files%\Consumer Input\InternetExplorer\dca-host.exe (27903 bytes)
%Program Files%\Consumer Input\InternetExplorer\dca.js (18506 bytes)
%Program Files%\Consumer Input\InternetExplorer\uninstall.log (844 bytes)
%Program Files%\Consumer Input\InternetExplorer\uninstall.ico (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp\nsis_plugin.dll (26100 bytes)
%Program Files%\Consumer Input\InternetExplorer\cookie-retriever.exe (4042 bytes)
%Program Files%\Consumer Input\InternetExplorer\mozjs185-1.0.dll (47540 bytes)
%Program Files%\Consumer Input\InternetExplorer\dca-bho.dll (22734 bytes)
%Program Files%\Consumer Input\InternetExplorer\uninstall.exe (46579 bytes)
%Program Files%\Consumer Input\InternetExplorer\cpturlpassthru.dll (19305 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw20.tmp\UAC.dll (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateHelper.msi (45 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_en.dll (28 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_fr.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUTD.tmp (9606 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_de.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputCrashHandler.exe (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es.dll (31 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdate.exe (105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psuser.dll (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdate.dll (1990 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_es-419.dll (29 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_ja.dll (25 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\goopdateres_zh-CN.dll (22 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\psmachine.dll (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateOnDemand.exe (60 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GUMC.tmp\ConsumerInputUpdateBroker.exe (60 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\PQIJTZ4N\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Q3YTPN1X\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\47P62KHJ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso4.tmp\inetc.dll (784 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsp5.tmp (117794 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\XP85A2LM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (400 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsj2.tmp (4984 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@histats[1].txt (201 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\47P62KHJ\0[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso3.tmp (43 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 23462 | 23552 | 4.51398 | 9d64b6ac6eb1aa41e38f6cc8798b652e |
.rdata | 28672 | 4496 | 4608 | 3.59163 | f179218a059068529bdb4637ef5fa28e |
.data | 36864 | 3774424 | 1024 | 3.26654 | af685ae5a632e08acd6c90a62cdfc3bb |
.ndata | 3813376 | 1732608 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
.rsrc | 5545984 | 1736 | 2048 | 2.02827 | db0203557b019ba1974795340bcccc85 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 24
8002fc0d24128006d3d5381415ef9a4a
c9d977c217713f2c6f64048f4f897224
ee3eabfdd2f7eca0cf831a114cb79942
5d5528266d7be56144604d72712f6b32
154ed6b88dabdd9dfb8c112e202107ad
9b16246fed47ee4e3806a551bb7fb3e2
ce8298657d2b8865a3f2663373352c5e
3f620621c2bd076a91f38b48cc48d7bb
fb6262c0dac702f8d4aa995b8d283388
1d5133ccb6eb69dc1a567402d614df24
953156b2aa6af41ad42512985619a911
306f2885222f7a97657a60f54beecd3d
d4ebe61e710b730de7aa4641e8b7af64
ca889f0aa9fd8815bb868f27ffb3d970
0e83e7ab709c96c3860d2afa4cded371
f3189b8c77a10b6fe41dea3dca1197c5
f60ea166b55974c2ff6893abf3df6d3f
18de6ef74565ac4f3c87bb4f73015f7f
09ffaadbd01675083cba9e89b8629ddb
f110f5edae2e51fbd45372f21d036eff
c31ecb1987f175df483de9013f301182
656eca37dbc0abc52c6859e775cb6ff8
8d56ac3144eb399613dcd15f945ce4e3
41858809fc38f8187834611593a44b4f
Network Activity
URLs
URL | IP |
---|---|
hxxp://sstatic1.histats.com/0.gif?2990802&101 | 208.43.241.179 |
hxxp://softwarepartnerships.com/downloads/consumerinput.exe | 54.84.142.154 |
hxxp://e6845.ce.akamaiedge.net/pca3-g5.crl | |
hxxp://e6845.ce.akamaiedge.net/sv.crl | |
hxxp://e6845.ce.akamaiedge.net/ThawteTimestampingCA.crl | |
hxxp://e6845.ce.akamaiedge.net/tss-ca-g2.crl | |
hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootseq.txt | |
hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt | |
hxxp://sv.symcb.com/sv.crl | 23.43.133.163 |
hxxp://s1.symcb.com/pca3-g5.crl | 23.43.133.163 |
hxxp://crl.thawte.com/ThawteTimestampingCA.crl | 23.43.133.163 |
hxxp://ts-crl.ws.symantec.com/tss-ca-g2.crl | 23.43.133.163 |
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt | 212.30.134.183 |
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | 212.30.134.183 |
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt | 212.30.134.183 |
update.consumerinput.com | 199.168.174.152 |
dcs-files.consumerinput.com | 23.65.116.97 |
sddcs.consumerinput.com | 198.90.21.164 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /0.gif?2990802&101 HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: sstatic1.histats.com
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Sun, 04 Oct 2015 02:06:48 GMT
Content-Type: image/gif
Content-Length: 43
Connection: close
Set-Cookie: CountUid=330a60cb-a9wc-4647-8687-39936e7fbd5e; domain=.histats.com; Max-Age=31536000; Expires=Mon, 03-Oct-2016 02:06:48 GMT
GIF89a.............!.......,...........D..;..
GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: text/plain
Last-Modified: Thu, 20 Aug 2015 18:11:19 GMT
Accept-Ranges: bytes
ETag: "803dac9c73dbd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 18
Date: Sun, 04 Oct 2015 02:07:14 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
1401D0DB739CEE64E9....
GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: application/octet-stream
Last-Modified: Thu, 20 Aug 2015 19:08:01 GMT
Accept-Ranges: bytes
ETag: "803e6c887bdbd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 50006
Date: Sun, 04 Oct 2015 02:07:14 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
MSCF....V.......,...................I..................G.` .authroot.stl.W....8..CK...<T.....c.5(..=..!Ev"..d'..c-iTBWI.H%..V.........E.%)...f....uo...~/.3..s..y>...=..l...dbUH4M...1....&J.}<...#.L..\.x!F.t.^......q..l8p.i.J'3.........J.5v....z-...A4U.T.E...h...}$.....5.=.....VnU..E.[.[a(.."..G..P..k.m.3.....EP>.g..?.kY|..L.v...qDz...T.&p.&..:.f....T.b..\...Af\..J..I.....tN09.......|,[r._..x..Y.e.(d..o...`3........(... .$...V..e.y.s$p...u...........W..~...A.B....GoOV.....JT.."VF.<.A....3...r.......addf`.....ph.J:r.E..[\L.X.:....?.. .....b...l....St...U.N;..a.h-W....4.Uqb.MbF=.X.C..DX..............V.U..P.....'........P=.?...s_.j...W_....P...-..t1@....s:...5..j7[.!Yb|.....l...G.F.E..?lg..m-n.(/6I..........._......5........n.t.<.'....Nim..;.!{........N.h...u.....x`... gR..B..V{.'..=}..=|.hg.9.6....j..w.[P`.G.....d..............!..t./..........*.@(8(v1....'..Z. ....R.r....1Jn.j.[p..At..W;F.(..a...N...X....=.[..'.r.....^$B.a...9....,v-...%.2...:...[..6.j...1..!{.....n..={.U....%...y,.....>a`..0..6..SJda.)9x...zqc..X..Vq.1z.....'^.....^sU|$.u...~.Lgf...Y...V..(f.(...m...-..-&,..c&z...-.....fGO..6...N.y<.z..,...g|.....!..$....<....q......q8.<t.k.p.=......z.}.Q.U....&J..-T......[...........}u...T.......>.y.e..CF".VX$;&T.>..].3.H....7k..w.m...(..#c...@...v....[..l..w.e.2..3..(y. ...|K9>...o..Uz.....V..W|.k.|...,..V.xPmV...X......!.........Jj.%.N_.9T.~...v...C.!.4.5a.!...(..../5j...@p.....S...F.jde........PC...MZO..........D~...%y.....i....a.$vu.7...{.6.{Y3....5.YD.d>,.....b...H.
<<< skipped >>>
GET /msdownload/update/v3/static/trustedr/en/75E0ABB6138512271C04F85FDDDE38E4B7242EFE.crt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Content-Type: application/x-x509-ca-cert
Last-Modified: Thu, 23 Jul 2015 23:16:35 GMT
Accept-Ranges: bytes
ETag: "80b4b9e9dc5d01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 958
Date: Sun, 04 Oct 2015 02:07:14 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
0...0..................&..0...*.H........0L1 0...U....GlobalSign Root CA - R21.0...U....GlobalSign1.0...U....GlobalSign0...061215080000Z..211215080000Z0L1 0...U....GlobalSign Root CA - R21.0...U....GlobalSign1.0...U....GlobalSign0.."0...*.H.............0..........$...o(.EB..>!T.....p......_.....0\....{...`......S..{~s..R.{J..I.^...Z..z........%..J.*./..w.....|.....:,.....Y}...._^Ij.9^.4..x....l..K..}.yM..-.!..l[}..).....I.$b. ........'. s.........../..M..6...z..m.a..\....Q..Z........`..._.r.`.^...J.?....!................0..0...U...........0...U.......0....0...U.........Wg...j..Y..-.....06..U.../0-0 .).'.%hXXp://crl.globalsign.net/root-r2.crl0...U.#..0......Wg...j..Y..-.....0...*.H...............S..h.....J.D....'O....Cx.....,<na.MK)....&.....bE......3K......N..q4..T.F?..*.mT".:b. o.)......\.>.[A...dC-..9...........E.-...-.tVI...O..nDx9..~..y....o....5.]...m..DmyF1~........n .P._.M........AjsS..P.n%..L...R..i.........I..... x.`..%@.j.~B8@d.......HTTP/1.1 200 OK..Content-Type: application/x-x509-ca-cert..Last-Modified: Thu, 23 Jul 2015 23:16:35 GMT..Accept-Ranges: bytes..ETag: "80b4b9e9dc5d01:0"..Server: Microsoft-IIS/7.5..X-Powered-By: ASP.NET..Content-Length: 958..Date: Sun, 04 Oct 2015 02:07:14 GMT..Connection: keep-alive..X-CCC: RU..X-CID: 2..0...0..................&..0...*.H........0L1 0...U....GlobalSign Root CA - R21.0...U....GlobalSign1.0...U....GlobalSign0...061215080000Z..211215080000Z0L1 0...U....GlobalSign Root CA - R21.0...U....GlobalSign1.0...U....GlobalSign0.."0...*.H.............0.........
<<< skipped >>>
GET /sv.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: sv.symcb.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Server: Apache
ETag: "904356d1c6fc399b05792b770106df2d:1443906720"
Last-Modified: Sat, 03 Oct 2015 21:12:00 GMT
Date: Sun, 04 Oct 2015 02:07:10 GMT
Content-Length: 14653
Connection: keep-alive
Content-Type: application/pkix-crl
0.990.8!...0...*.H........0.1.0...U....US1.0...U....Symantec Corporation1.0...U....Symantec Trust Network100...U...'Symantec Class 3 SHA256 Code Signing CA..151003210113Z..151017210113Z0.7:0!...M.h .{m.&...C....150827201412Z0!...\..N.....F.E..*..150818144018Z0!...o. .z..%5.O.W....150306094921Z0!....~_..N.W..f.1....150309185437Z0!.......w.....-Z.....150925144610Z0!......)-.5....Y.....150420152841Z0!.... ...E...H] .....150324162430Z0!...A5.j..F.e....o4..150717171629Z0!...}I...jR.y.....x..150708140159Z0!....!..m.?.AN.......150623233015Z0!...........m........150427234712Z0!..../G..g.......x...150306012430Z0!..........y..n"%.\..150615101331Z0!....a....D.....tB...150804133623Z0!...i....U..a:...Ll..150112095207Z0!....!........Z..A...150505104631Z0!...As.......l..O....150520202423Z0!...v.~3} ......;....150907144307Z0!...............h.A..150902053702Z0!...!.@.Rc..e..y.....150601203750Z0!...:y;.@...vg|3[,...150505010404Z0!...SM!.l."N.g..._}..150827201412Z0!.......12u..L...UU..150721021023Z0!.......".pO<........150309205556Z0!....s.T..B...*o.....150213062833Z0!...YS?.]0.d.........150609150329Z0!.....J....m.x...@...150209140201Z0!...5]....j.|)E.X0...150902053730Z0!...U..p. p...Z...3..150319052518Z0!...V.:..S.).........150318160151Z0!...e.Q.....5]A......141021211828Z0!.....dG..eh;.&09....150327074549Z0!...i].......?I.8....150727191342Z0!..........<I.&..0...150602181147Z0!....:..O.....J...`..150528174007Z0!..........%aO....=..150206171204Z0!...1..^K.. a<E......140820001209Z0!.....F..n... n6.zr..150717171104Z0!......
<<< skipped >>>
GET /pca3-g5.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: s1.symcb.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Server: Apache
ETag: "2235a72ff18d351e39c5c63221752775:1442874344"
Last-Modified: Mon, 21 Sep 2015 22:25:43 GMT
Date: Sun, 04 Oct 2015 02:07:10 GMT
Content-Length: 533
Connection: keep-alive
Content-Type: application/pkix-crl
0...0..0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1:08..U...1(c) 2006 VeriSign, Inc. - For authorized use only1E0C..U...<VeriSign Class 3 Public Primary Certification Authority - G5..150917000000Z..151231235959Z0...*.H................v'....{....."W*<../w...Bj.....H......ll..%..Y&.HtQ...}...F.{>..3.[..z.H...W../.3.Y.C.t....S{^.A.....G...^...YI.[..N.y..........p.....;....x6z..i7..0...lS$..h.#.9%[.,.1..1....3.....h;<...........W%....doi~..e6G........w........{c..............j.Em.....i.HTTP/1.1 200 OK..Server: Apache..ETag: "2235a72ff18d351e39c5c63221752775:1442874344"..Last-Modified: Mon, 21 Sep 2015 22:25:43 GMT..Date: Sun, 04 Oct 2015 02:07:10 GMT..Content-Length: 533..Connection: keep-alive..Content-Type: application/pkix-crl..0...0..0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1:08..U...1(c) 2006 VeriSign, Inc. - For authorized use only1E0C..U...<VeriSign Class 3 Public Primary Certification Authority - G5..150917000000Z..151231235959Z0...*.H................v'....{....."W*<../w...Bj.....H......ll..%..Y&.HtQ...}...F.{>..3.[..z.H...W../.3.Y.C.t....S{^.A.....G...^...YI.[..N.y..........p.....;....x6z..i7..0...lS$..h.#.9%[.,.1..1....3.....h;<...........W%....doi~..e6G........w........{c..............j.Em.....i...
<<< skipped >>>
GET /downloads/consumerinput.exe HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: softwarepartnerships.com
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Sun, 04 Oct 2015 02:06:48 GMT
Server: Apache
Last-Modified: Tue, 22 Sep 2015 01:28:43 GMT
ETag: "215c6-1d3960-5204beb26dd9d"
Accept-Ranges: bytes
Content-Length: 1915232
Cache-Control: max-age=10, s-maxage=10, private, no-cache, no-store, must-revalidate, proxy-revalidate
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/octet-stream
MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...b|.N.................t...z...B...8............@.......................................@.................................@...........X}..........@!.. ....`.......................................................................................text....r.......t.................. ..`.rdata..n .......,...x..............@..@.data.... ..........................@....ndata...................................rsrc...X}.......~..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................U....\.}..t .}.F.E.u..H......G..H.P.u..u..u.....@..K...SV.5..G.W.E.P.u.....@..e...E..E.P.u.....@..}..e....D.@........FR..VV..U... M..........M........E...FQ.....NU..M.......M...VT..U........FP..E...............E.P.M...H.@..E..P.E..E.P.u.....@..u....E..9}...n....~X.te.v4..L.@..E...tU.}.j.W.E......E.......P.@..vXW..T.@..u..5X.@.W..h ....E..E.Pj.h.jG.W....@..u.W...u....E.P.u.....@._^3.[.....L$....G...i. @...T.....tUVW.q.3.;5..G.sD..i. @...D..S.....t.G.....t...O..t .....u...3....3...F. @..;5..G.r.[_^...U..QQ
<<< skipped >>>
GET /ThawteTimestampingCA.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: crl.thawte.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Server: Apache
ETag: "7a03192e8eb5e46cf6e2dde73da12dc9:1443077122"
Last-Modified: Thu, 24 Sep 2015 06:45:22 GMT
Date: Sun, 04 Oct 2015 02:07:10 GMT
Content-Length: 341
Connection: keep-alive
Content-Type: application/pkix-crl
0..Q0..0...*.H........0..1.0...U....ZA1.0...U....Western Cape1.0...U....Durbanville1.0...U....Thawte1.0...U....Thawte Certification1.0...U....Thawte Timestamping CA..150917000000Z..151231235959Z0...*.H............,gx*..)..Z.1.g5.%N...<.,:.U@....EVM..K.[.$.T$......}....N.....c^...g...G.$...\N .......$.V|(...-.S.y:v..I....\..1*X.;........U\.HTTP/1.1 200 OK..Server: Apache..ETag: "7a03192e8eb5e46cf6e2dde73da12dc9:1443077122"..Last-Modified: Thu, 24 Sep 2015 06:45:22 GMT..Date: Sun, 04 Oct 2015 02:07:10 GMT..Content-Length: 341..Connection: keep-alive..Content-Type: application/pkix-crl..0..Q0..0...*.H........0..1.0...U....ZA1.0...U....Western Cape1.0...U....Durbanville1.0...U....Thawte1.0...U....Thawte Certification1.0...U....Thawte Timestamping CA..150917000000Z..151231235959Z0...*.H............,gx*..)..Z.1.g5.%N...<.,:.U@....EVM..K.[.$.T$......}....N.....c^...g...G.$...\N .......$.V|(...-.S.y:v..I....\..1*X.;........U\...
GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: text/plain
Last-Modified: Thu, 20 Aug 2015 18:11:19 GMT
Accept-Ranges: bytes
ETag: "803dac9c73dbd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 18
Date: Sun, 04 Oct 2015 02:07:14 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
1401D0DB739CEE64E9....
GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: application/octet-stream
Last-Modified: Thu, 20 Aug 2015 19:08:01 GMT
Accept-Ranges: bytes
ETag: "803e6c887bdbd01:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 50006
Date: Sun, 04 Oct 2015 02:07:14 GMT
Connection: keep-alive
X-CCC: RU
X-CID: 2
MSCF....V.......,...................I..................G.` .authroot.stl.W....8..CK...<T.....c.5(..=..!Ev"..d'..c-iTBWI.H%..V.........E.%)...f....uo...~/.3..s..y>...=..l...dbUH4M...1....&J.}<...#.L..\.x!F.t.^......q..l8p.i.J'3.........J.5v....z-...A4U.T.E...h...}$.....5.=.....VnU..E.[.[a(.."..G..P..k.m.3.....EP>.g..?.kY|..L.v...qDz...T.&p.&..:.f....T.b..\...Af\..J..I.....tN09.......|,[r._..x..Y.e.(d..o...`3........(... .$...V..e.y.s$p...u...........W..~...A.B....GoOV.....JT.."VF.<.A....3...r.......addf`.....ph.J:r.E..[\L.X.:....?.. .....b...l....St...U.N;..a.h-W....4.Uqb.MbF=.X.C..DX..............V.U..P.....'........P=.?...s_.j...W_....P...-..t1@....s:...5..j7[.!Yb|.....l...G.F.E..?lg..m-n.(/6I..........._......5........n.t.<.'....Nim..;.!{........N.h...u.....x`... gR..B..V{.'..=}..=|.hg.9.6....j..w.[P`.G.....d..............!..t./..........*.@(8(v1....'..Z. ....R.r....1Jn.j.[p..At..W;F.(..a...N...X....=.[..'.r.....^$B.a...9....,v-...%.2...:...[..6.j...1..!{.....n..={.U....%...y,.....>a`..0..6..SJda.)9x...zqc..X..Vq.1z.....'^.....^sU|$.u...~.Lgf...Y...V..(f.(...m...-..-&,..c&z...-.....fGO..6...N.y<.z..,...g|.....!..$....<....q......q8.<t.k.p.=......z.}.Q.U....&J..-T......[...........}u...T.......>.y.e..CF".VX$;&T.>..].3.H....7k..w.m...(..#c...@...v....[..l..w.e.2..3..(y. ...|K9>...o..Uz.....V..W|.k.|...,..V.xPmV...X......!.........Jj.%.N_.9T.~...v...C.!.4.5a.!...(..../5j...@p.....S...F.jde........PC...MZO..........D~...%y.....i....a.$vu.7...{.6.{Y3....5.YD.d>,.....b...H.
<<< skipped >>>
GET /tss-ca-g2.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: ts-crl.ws.symantec.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Server: Apache
ETag: "417c056463966cd1140d845dcc5b4e72:1443906742"
Last-Modified: Sat, 03 Oct 2015 21:12:22 GMT
Date: Sun, 04 Oct 2015 02:07:11 GMT
Content-Length: 477
Connection: keep-alive
Content-Type: application/pkix-crl
0...0.....0...*.H........0^1.0...U....US1.0...U....Symantec Corporation100...U...'Symantec Time Stamping Services CA - G2..151003210118Z..151013210118Z.00.0...U.#..0..._..n\..t...}.?..L...0...U.......a0...*.H..............\.Oik.D)t......o.....u.#...RX..$s:.....S...$....HqT.....6.........Qn...V...Xn...O,..8{.....>.......k.x..........6.t.......L7...M.....".)F..j.. /I...%,..w..mu_..Kw...M.7.C..tL3.e...p..e.l..#.M./qFm$......R.A!.}8.<!......#...:b........7..l.....M....i.{y.w..HTTP/1.1 200 OK..Server: Apache..ETag: "417c056463966cd1140d845dcc5b4e72:1443906742"..Last-Modified: Sat, 03 Oct 2015 21:12:22 GMT..Date: Sun, 04 Oct 2015 02:07:11 GMT..Content-Length: 477..Connection: keep-alive..Content-Type: application/pkix-crl..0...0.....0...*.H........0^1.0...U....US1.0...U....Symantec Corporation100...U...'Symantec Time Stamping Services CA - G2..151003210118Z..151013210118Z.00.0...U.#..0..._..n\..t...}.?..L...0...U.......a0...*.H..............\.Oik.D)t......o.....u.#...RX..$s:.....S...$....HqT.....6.........Qn...V...Xn...O,..8{.....>.......k.x..........6.t.......L7...M.....".)F..j.. /I...%,..w..mu_..Kw...M.7.C..tL3.e...p..e.l..#.M./qFm$......R.A!.}8.<!......#...:b........7..l.....M....i.{y.w....
Map
The Trojan connects to the servers at the folowing location(s):
Strings from Dumps
dca-monitoring.exe_1556:
.text
.text
`.rdata
`.rdata
@.data
@.data
.rsrc
.rsrc
@.reloc
@.reloc
t8It.IIt#
t8It.IIt#
.CGy,
.CGy,
\$()\$(3
\$()\$(3
FTPj
FTPj
uÂIu
uÂIu
X.jcW
X.jcW
f;F.sj
f;F.sj
F.CY;
F.CY;
t.SSSj
t.SSSj
f;C.sV
f;C.sV
|%f;M
|%f;M
.6.78.9:;
.6.78.9:;
B.CDEFFG
B.CDEFFG
xSSSh
xSSSh
FTPjKS
FTPjKS
FtPj;S
FtPj;S
C.PjRV
C.PjRV
Visual C CRT: Not enough memory to complete call to strerror.
Visual C CRT: Not enough memory to complete call to strerror.
portuguese-brazilian
portuguese-brazilian
Broken pipe
Broken pipe
Inappropriate I/O control operation
Inappropriate I/O control operation
Operation not permitted
Operation not permitted
operator
operator
GetProcessWindowStation
GetProcessWindowStation
3.8.10.1
3.8.10.1
SQLite format 3
SQLite format 3
CREATE TABLE sqlite_master(
CREATE TABLE sqlite_master(
sql text
sql text
CREATE TEMP TABLE sqlite_temp_master(
CREATE TEMP TABLE sqlite_temp_master(
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYWITHOUTERELEASEATTACHAVINGROUPDATEBEGINNERECURSIVEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTRIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLY
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYWITHOUTERELEASEATTACHAVINGROUPDATEBEGINNERECURSIVEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTRIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLY
()$^.* ?[]|\-{},:=!
()$^.* ?[]|\-{},:=!
RegOpenKeyTransactedW
RegOpenKeyTransactedW
RegCreateKeyTransactedW
RegCreateKeyTransactedW
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.panelID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.panelID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.userID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.userID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.machineID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.machineID'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.version'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.version'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.version'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.version'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.installTime'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.installTime'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.installType'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.dca.installType'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.disablePostInstall'
SELECT value FROM itemtable WHERE key == 'extensions.cicr.disablePostInstall'
large file support is disabled
large file support is disabled
unknown operation
unknown operation
SQL logic error or missing database
SQL logic error or missing database
foreign_keys
foreign_keys
foreign_key_list
foreign_key_list
foreign_key_check
foreign_key_check
defer_foreign_keys
defer_foreign_keys
sqlite_compileoption_get
sqlite_compileoption_get
sqlite_compileoption_used
sqlite_compileoption_used
sqlite_log
sqlite_log
sqlite_source_id
sqlite_source_id
sqlite_version
sqlite_version
sqlite_attach
sqlite_attach
sqlite_detach
sqlite_detach
sqlite_stat4
sqlite_stat4
sqlite_stat3
sqlite_stat3
sqlite_stat1
sqlite_stat1
sqlite_rename_parent
sqlite_rename_parent
sqlite_rename_trigger
sqlite_rename_trigger
sqlite_rename_table
sqlite_rename_table
FOREIGN KEY
FOREIGN KEY
GetProcessHeap
GetProcessHeap
RowKey
RowKey
SQLITE_
SQLITE_
d-d-d d:d:d
d-d-d d:d:d
d:d:d
d:d:d
d-d-d
d-d-d
failed to allocate %u bytes of memory
failed to allocate %u bytes of memory
failed memory resize %u to %u bytes
failed memory resize %u to %u bytes
922337203685477580
922337203685477580
API call with %s database connection pointer
API call with %s database connection pointer
os_win.c:%d: (%lu) %s(%s) - %s
os_win.c:%d: (%lu) %s(%s) - %s
delayed %dms for lock/sharing conflict at line %d
delayed %dms for lock/sharing conflict at line %d
%s-shm
%s-shm
%s%c%s
%s%c%s
recovered %d pages from %s
recovered %d pages from %s
recovered %d frames from WAL file %s
recovered %d frames from WAL file %s
cannot limit WAL size: %s
cannot limit WAL size: %s
invalid page number %d
invalid page number %d
2nd reference to page %d
2nd reference to page %d
Failed to read ptrmap key=%d
Failed to read ptrmap key=%d
Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)
Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)
%d of %d pages missing from overflow list starting at %d
%d of %d pages missing from overflow list starting at %d
failed to get page %d
failed to get page %d
freelist leaf count too big on page %d
freelist leaf count too big on page %d
Page %d:
Page %d:
unable to get the page. error code=%d
unable to get the page. error code=%d
btreeInitPage() returns error code %d
btreeInitPage() returns error code %d
On tree page %d cell %d:
On tree page %d cell %d:
On page %d at right child:
On page %d at right child:
Corruption detected in cell %d on page %d
Corruption detected in cell %d on page %d
Multiple uses for byte %u of page %d
Multiple uses for byte %u of page %d
Fragmentation of %d bytes reported as %d on page %d
Fragmentation of %d bytes reported as %d on page %d
Page %d is never used
Page %d is never used
Pointer map page %d is referenced
Pointer map page %d is referenced
Outstanding page count goes from %d to %d during this analysis
Outstanding page count goes from %d to %d during this analysis
unknown database %s
unknown database %s
%s(%d)
%s(%d)
%s-mjXXXXXX9XXz
%s-mjXXXXXX9XXz
MJ delete: %s
MJ delete: %s
MJ collide: %s
MJ collide: %s
-mjX9X
-mjX9X
FOREIGN KEY constraint failed
FOREIGN KEY constraint failed
unable to use function %s in the requested context
unable to use function %s in the requested context
bind on a busy prepared statement: [%s]
bind on a busy prepared statement: [%s]
zeroblob(%d)
zeroblob(%d)
abort at %d in [%s]: %s
abort at %d in [%s]: %s
%s constraint failed: %s
%s constraint failed: %s
%s constraint failed
%s constraint failed
cannot open savepoint - SQL statements in progress
cannot open savepoint - SQL statements in progress
no such savepoint: %s
no such savepoint: %s
cannot release savepoint - SQL statements in progress
cannot release savepoint - SQL statements in progress
cannot commit transaction - SQL statements in progress
cannot commit transaction - SQL statements in progress
sqlite_temp_master
sqlite_temp_master
sqlite_master
sqlite_master
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
cannot change %s wal mode from within a transaction
cannot change %s wal mode from within a transaction
database table is locked: %s
database table is locked: %s
statement aborts at %d: [%s] %s
statement aborts at %d: [%s] %s
cannot open value of type %s
cannot open value of type %s
cannot open virtual table: %s
cannot open virtual table: %s
cannot open table without rowid: %s
cannot open table without rowid: %s
cannot open view: %s
cannot open view: %s
no such column: "%s"
no such column: "%s"
foreign key
foreign key
indexed
indexed
cannot open %s column for writing
cannot open %s column for writing
misuse of aliased aggregate %s
misuse of aliased aggregate %s
%s: %s.%s.%s
%s: %s.%s.%s
%s: %s.%s
%s: %s.%s
%s: %s
%s: %s
%s prohibited in partial index WHERE clauses
%s prohibited in partial index WHERE clauses
%s prohibited in CHECK constraints
%s prohibited in CHECK constraints
not authorized to use function: %s
not authorized to use function: %s
%r %s BY term out of range - should be between 1 and %d
%r %s BY term out of range - should be between 1 and %d
too many terms in %s BY clause
too many terms in %s BY clause
Expression tree is too large (maximum depth %d)
Expression tree is too large (maximum depth %d)
variable number must be between ?1 and ?%d
variable number must be between ?1 and ?%d
too many SQL variables
too many SQL variables
too many columns in %s
too many columns in %s
EXECUTE %s%s SUBQUERY %d
EXECUTE %s%s SUBQUERY %d
hex literal too big: %s
hex literal too big: %s
misuse of aggregate: %s()
misuse of aggregate: %s()
%.*s"%w"%s
%.*s"%w"%s
%s%.*s"%w"
%s%.*s"%w"
%s OR name=%Q
%s OR name=%Q
type='trigger' AND (%s)
type='trigger' AND (%s)
sqlite_
sqlite_
table %s may not be altered
table %s may not be altered
there is already another table or index with this name: %s
there is already another table or index with this name: %s
view %s may not be altered
view %s may not be altered
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
sqlite_sequence
sqlite_sequence
UPDATE "%w".sqlite_sequence set name = %Q WHERE name = %Q
UPDATE "%w".sqlite_sequence set name = %Q WHERE name = %Q
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Cannot add a PRIMARY KEY column
Cannot add a PRIMARY KEY column
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
sqlite_altertab_%s
sqlite_altertab_%s
CREATE TABLE %Q.%s(%s)
CREATE TABLE %Q.%s(%s)
DELETE FROM %Q.%s WHERE %s=%Q
DELETE FROM %Q.%s WHERE %s=%Q
SELECT tbl,idx,stat FROM %Q.sqlite_stat1
SELECT tbl,idx,stat FROM %Q.sqlite_stat1
too many attached databases - max %d
too many attached databases - max %d
database %s is already in use
database %s is already in use
unable to open database: %s
unable to open database: %s
no such database: %s
no such database: %s
cannot detach database %s
cannot detach database %s
database %s is locked
database %s is locked
%s %T cannot reference objects in database %s
%s %T cannot reference objects in database %s
%s cannot use variables
%s cannot use variables
access to %s.%s.%s is prohibited
access to %s.%s.%s is prohibited
access to %s.%s is prohibited
access to %s.%s is prohibited
object name reserved for internal use: %s
object name reserved for internal use: %s
there is already an index named %s
there is already an index named %s
too many columns on %s
too many columns on %s
duplicate column name: %s
duplicate column name: %s
default value of column [%s] is not constant
default value of column [%s] is not constant
table "%s" has more than one primary key
table "%s" has more than one primary key
AUTOINCREMENT is only allowed on an INTEGER PRIMARY KEY
AUTOINCREMENT is only allowed on an INTEGER PRIMARY KEY
PRIMARY KEY missing on table %s
PRIMARY KEY missing on table %s
CREATE %s %.*s
CREATE %s %.*s
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
CREATE TABLE %Q.sqlite_sequence(name,seq)
CREATE TABLE %Q.sqlite_sequence(name,seq)
view %s is circularly defined
view %s is circularly defined
UPDATE %Q.%s SET rootpage=%d WHERE #%d AND rootpage=#%d
UPDATE %Q.%s SET rootpage=%d WHERE #%d AND rootpage=#%d
sqlite_stat%d
sqlite_stat%d
DELETE FROM %Q.sqlite_sequence WHERE name=%Q
DELETE FROM %Q.sqlite_sequence WHERE name=%Q
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
sqlite_stat
sqlite_stat
table %s may not be dropped
table %s may not be dropped
use DROP TABLE to delete table %s
use DROP TABLE to delete table %s
use DROP VIEW to delete view %s
use DROP VIEW to delete view %s
foreign key on %s should reference only one column of table %T
foreign key on %s should reference only one column of table %T
number of columns in foreign key does not match the number of columns in the referenced table
number of columns in foreign key does not match the number of columns in the referenced table
unknown column "%s" in foreign key definition
unknown column "%s" in foreign key definition
cannot create a TEMP index on non-TEMP table "%s"
cannot create a TEMP index on non-TEMP table "%s"
table %s may not be indexed
table %s may not be indexed
views may not be indexed
views may not be indexed
virtual tables may not be indexed
virtual tables may not be indexed
there is already a table named %s
there is already a table named %s
index %s already exists
index %s already exists
sqlite_autoindex_%s_%d
sqlite_autoindex_%s_%d
table %s has no column named %s
table %s has no column named %s
CREATE%s INDEX %.*s
CREATE%s INDEX %.*s
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
no such index: %S
no such index: %S
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
a JOIN clause is required before %s
a JOIN clause is required before %s
%s.%s
%s.%s
%s.rowid
%s.rowid
unable to identify the object to be reindexed
unable to identify the object to be reindexed
duplicate WITH table name: %s
duplicate WITH table name: %s
no such collation sequence: %s
no such collation sequence: %s
table %s may not be modified
table %s may not be modified
cannot modify %s because it is a view
cannot modify %s because it is a view
foreign key mismatch - "%w" referencing "%w"
foreign key mismatch - "%w" referencing "%w"
table %S has no column named %s
table %S has no column named %s
table %S has %d columns but %d values were supplied
table %S has %d columns but %d values were supplied
%d values for %d columns
%d values for %d columns
sqlite3_extension_init
sqlite3_extension_init
unable to open shared library [%s]
unable to open shared library [%s]
sqlite3_
sqlite3_
no entry point [%s] in shared library [%s]
no entry point [%s] in shared library [%s]
error during initialization: %s
error during initialization: %s
automatic extension loading failed: %s
automatic extension loading failed: %s
*** in database %s ***
*** in database %s ***
NULL value in %s.%s
NULL value in %s.%s
unsupported encoding: %s
unsupported encoding: %s
malformed database schema (%s)
malformed database schema (%s)
%s - %s
%s - %s
unsupported file format
unsupported file format
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
database schema is locked: %s
database schema is locked: %s
unknown or unsupported join type: %T %T%s%T
unknown or unsupported join type: %T %T%s%T
RIGHT and FULL OUTER JOINs are not currently supported
RIGHT and FULL OUTER JOINs are not currently supported
a NATURAL join may not have an ON or USING clause
a NATURAL join may not have an ON or USING clause
cannot have both ON and USING clauses in the same join
cannot have both ON and USING clauses in the same join
cannot join using column %s - column not present in both tables
cannot join using column %s - column not present in both tables
USE TEMP B-TREE FOR %s
USE TEMP B-TREE FOR %s
COMPOUND SUBQUERIES %d AND %d %s(%s)
COMPOUND SUBQUERIES %d AND %d %s(%s)
column%d
column%d
%s:%d
%s:%d
SELECTs to the left and right of %s do not have the same number of result columns
SELECTs to the left and right of %s do not have the same number of result columns
ORDER BY clause should come after %s not before
ORDER BY clause should come after %s not before
LIMIT clause should come after %s not before
LIMIT clause should come after %s not before
no such index: %s
no such index: %s
multiple references to recursive table: %s
multiple references to recursive table: %s
circular reference: %s
circular reference: %s
table %s has %d values for %d columns
table %s has %d values for %d columns
multiple recursive references: %s
multiple recursive references: %s
recursive reference in a subquery: %s
recursive reference in a subquery: %s
sqlite_sq_%p
sqlite_sq_%p
too many references to "%s": max 65535
too many references to "%s": max 65535
%s.%s.%s
%s.%s.%s
no such table: %s
no such table: %s
SCAN TABLE %s%s%s
SCAN TABLE %s%s%s
sqlite3_get_table() called with two or more incompatible queries
sqlite3_get_table() called with two or more incompatible queries
cannot create %s trigger on view: %S
cannot create %s trigger on view: %S
cannot create INSTEAD OF trigger on table: %S
cannot create INSTEAD OF trigger on table: %S
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')
no such trigger: %S
no such trigger: %S
-- TRIGGER %s
-- TRIGGER %s
no such column: %s
no such column: %s
cannot VACUUM - SQL statements in progress
cannot VACUUM - SQL statements in progress
PRAGMA vacuum_db.synchronous=OFF
PRAGMA vacuum_db.synchronous=OFF
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
vtable constructor called recursively: %s
vtable constructor called recursively: %s
vtable constructor failed: %s
vtable constructor failed: %s
vtable constructor did not declare schema: %s
vtable constructor did not declare schema: %s
no such module: %s
no such module: %s
automatic index on %s(%s)
automatic index on %s(%s)
table %s: xBestIndex returned an invalid plan
table %s: xBestIndex returned an invalid plan
ANY(%s)
ANY(%s)
SUBQUERY %d
SUBQUERY %d
TABLE %s
TABLE %s
AS %s
AS %s
PRIMARY KEY
PRIMARY KEY
COVERING INDEX %s
COVERING INDEX %s
INDEX %s
INDEX %s
USING INTEGER PRIMARY KEY
USING INTEGER PRIMARY KEY
VIRTUAL TABLE INDEX %d:%s
VIRTUAL TABLE INDEX %d:%s
%s.xBestIndex() malfunction
%s.xBestIndex() malfunction
at most %d tables in a join
at most %d tables in a join
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
unknown database: %s
unknown database: %s
no such %s mode: %s
no such %s mode: %s
%s mode not allowed: %s
%s mode not allowed: %s
no such vfs: %s
no such vfs: %s
database corruption at line %d of [%.10s]
database corruption at line %d of [%.10s]
misuse at line %d of [%.10s]
misuse at line %d of [%.10s]
cannot open file at line %d of [%.10s]
cannot open file at line %d of [%.10s]
no such table column: %s.%s
no such table column: %s.%s
D:\jenkins\workspace\MT\dca-monitoring\main\dist\Release\dca-monitoring.pdb
D:\jenkins\workspace\MT\dca-monitoring\main\dist\Release\dca-monitoring.pdb
InternetCrackUrlW
InternetCrackUrlW
WinHttpOpenRequest
WinHttpOpenRequest
WinHttpSetOption
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpAddRequestHeaders
WinHttpConnect
WinHttpConnect
WinHttpOpen
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSendRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpReadData
urlmon.dll
urlmon.dll
WININET.dll
WININET.dll
WinHttpCloseHandle
WinHttpCloseHandle
WINHTTP.dll
WINHTTP.dll
WinHttpQueryHeaders
WinHttpQueryHeaders
NETAPI32.dll
NETAPI32.dll
CRYPT32.dll
CRYPT32.dll
VERSION.dll
VERSION.dll
CreatePipe
CreatePipe
KERNEL32.dll
KERNEL32.dll
EnumWindows
EnumWindows
USER32.dll
USER32.dll
GDI32.dll
GDI32.dll
RegOpenKeyW
RegOpenKeyW
RegCloseKey
RegCloseKey
RegOpenKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegCreateKeyExW
RegEnumKeyExW
RegEnumKeyExW
RegNotifyChangeKeyValue
RegNotifyChangeKeyValue
ADVAPI32.dll
ADVAPI32.dll
ShellExecuteW
ShellExecuteW
SHELL32.dll
SHELL32.dll
ole32.dll
ole32.dll
OLEAUT32.dll
OLEAUT32.dll
SHDeleteKeyW
SHDeleteKeyW
SHLWAPI.dll
SHLWAPI.dll
GetCPInfo
GetCPInfo
zcÃ
zcÃ
.?AVIExecutorTask@@
.?AVIExecutorTask@@
.?AV?$sp_counted_impl_p@VCChromeActivationCondition@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeActivationCondition@@@detail@boost@@
.?AVCChromeActivationCondition@@
.?AVCChromeActivationCondition@@
.?AV?$sp_counted_impl_p@VCChromeActivationMethod@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeActivationMethod@@@detail@boost@@
.?AVCChromeActivationMethod@@
.?AVCChromeActivationMethod@@
.?AV?$bind_t@_NV?$mf3@_NVCChromeActivationMethod@@PAKV?$CComPtr@UIUIAutomationElement@@@ATL@@AAV23@@_mfi@boost@@V?$list4@V?$value@PAVCChromeActivationMethod@@@_bi@boost@@U?$arg@$00@3@V?$value@V?$CComPtr@UIUIAutomationElement@@@ATL@@@23@V?$reference_wrapper@V?$CComPtr@UIUIAutomationElement@@@ATL@@@3@@_bi@3@@_bi@boost@@
.?AV?$bind_t@_NV?$mf3@_NVCChromeActivationMethod@@PAKV?$CComPtr@UIUIAutomationElement@@@ATL@@AAV23@@_mfi@boost@@V?$list4@V?$value@PAVCChromeActivationMethod@@@_bi@boost@@U?$arg@$00@3@V?$value@V?$CComPtr@UIUIAutomationElement@@@ATL@@@23@V?$reference_wrapper@V?$CComPtr@UIUIAutomationElement@@@ATL@@@3@@_bi@3@@_bi@boost@@
.?AV?$bind_t@_NV?$mf2@_NVCChromeActivationMethod@@PAKV?$CComPtr@UIUIAutomationElement@@@ATL@@@_mfi@boost@@V?$list3@V?$value@PAVCChromeActivationMethod@@@_bi@boost@@U?$arg@$00@3@V?$value@V?$CComPtr@UIUIAutomationElement@@@ATL@@@23@@_bi@3@@_bi@boost@@
.?AV?$bind_t@_NV?$mf2@_NVCChromeActivationMethod@@PAKV?$CComPtr@UIUIAutomationElement@@@ATL@@@_mfi@boost@@V?$list3@V?$value@PAVCChromeActivationMethod@@@_bi@boost@@U?$arg@$00@3@V?$value@V?$CComPtr@UIUIAutomationElement@@@ATL@@@23@@_bi@3@@_bi@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxSilentActivationMethod@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxSilentActivationMethod@@@detail@boost@@
.?AVCFirefoxSilentActivationMethod@@
.?AVCFirefoxSilentActivationMethod@@
.?AV?$sp_counted_impl_p@VCChromeExtensionManager@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeExtensionManager@@@detail@boost@@
.?AVCChromeExtensionManager@@
.?AVCChromeExtensionManager@@
.?AV?$sp_counted_impl_p@VCFirefoxExtensionManager@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxExtensionManager@@@detail@boost@@
.?AVCFirefoxExtensionManager@@
.?AVCFirefoxExtensionManager@@
.?AV?$sp_counted_impl_p@VCHttpHeaders@Http@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpHeaders@Http@@@detail@boost@@
.?AVIHttpRequestFactory@@
.?AVIHttpRequestFactory@@
.?AVCAbstractHttpRequestFactory@@
.?AVCAbstractHttpRequestFactory@@
.?AVCHttpRequestExecutorTask@@
.?AVCHttpRequestExecutorTask@@
.?AV?$sp_counted_impl_p@VCHttpRequestProvider@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpRequestProvider@@@detail@boost@@
.?AVCHttpRequestProvider@@
.?AVCHttpRequestProvider@@
.?AV?$sp_counted_impl_p@VCHttpRequestSender@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpRequestSender@@@detail@boost@@
.?AVIHttpFactory@@
.?AVIHttpFactory@@
.?AVIExecutorFactory@@
.?AVIExecutorFactory@@
.?AVCHttpRequestSender@@
.?AVCHttpRequestSender@@
.?AV?$CAtlExeModuleT@VCModule@@@ATL@@
.?AV?$CAtlExeModuleT@VCModule@@@ATL@@
.?AVIHttpRequestListener@@
.?AVIHttpRequestListener@@
.?AVCIeDailyStatusReporterTask@@
.?AVCIeDailyStatusReporterTask@@
.?AV?$_IDispEventLocator@$0IDH@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B@ATL@@
.?AV?$_IDispEventLocator@$0IDH@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B@ATL@@
.?AV?$IDispEventSimpleImpl@$0IDH@V?$CUserPromptDialog@$0HNB@$0IDH@@@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B@ATL@@
.?AV?$IDispEventSimpleImpl@$0IDH@V?$CUserPromptDialog@$0HNB@$0IDH@@@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B@ATL@@
.?AV?$IDispEventImpl@$0IDH@V?$CUserPromptDialog@$0HNB@$0IDH@@@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B$1?LIBID_SHDocVw@@3U3@B$00$00VCComTypeInfoHolder@ATL@@@ATL@@
.?AV?$IDispEventImpl@$0IDH@V?$CUserPromptDialog@$0HNB@$0IDH@@@$1?DIID_DWebBrowserEvents2@@3U_GUID@@B$1?LIBID_SHDocVw@@3U3@B$00$00VCComTypeInfoHolder@ATL@@@ATL@@
.?AV?$sp_counted_impl_p@VCWebInstallService@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCWebInstallService@@@detail@boost@@
.?AVCWebInstallService@@
.?AVCWebInstallService@@
.?AVCExecutorTaskContext@@
.?AVCExecutorTaskContext@@
.?AVIExecutorLifecycleListener@@
.?AVIExecutorLifecycleListener@@
.?AV?$sp_counted_impl_p@V?$vector@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$allocator@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$vector@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$allocator@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxStartStopComponent@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxStartStopComponent@@@detail@boost@@
.?AVCFirefoxStartStopComponent@@
.?AVCFirefoxStartStopComponent@@
.?AV?$sp_counted_impl_p@UUrlComponents@Http@@@detail@boost@@
.?AV?$sp_counted_impl_p@UUrlComponents@Http@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeProfileFactory@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeProfileFactory@@@detail@boost@@
.?AVCChromeProfileFactory@@
.?AVCChromeProfileFactory@@
.?AV?$sp_counted_impl_p@VCFirefoxProfileFactory@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxProfileFactory@@@detail@boost@@
.?AVCFirefoxProfileFactory@@
.?AVCFirefoxProfileFactory@@
.?AV?$sp_counted_impl_p@VCHttpUrl@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpUrl@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpRequestData@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpRequestData@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCDefaultHttpResultPolicy@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCDefaultHttpResultPolicy@@@detail@boost@@
.?AVCDefaultHttpResultPolicy@@
.?AVCDefaultHttpResultPolicy@@
.?AVIHttpResultPolicy@@
.?AVIHttpResultPolicy@@
.?AV?$sp_counted_impl_p@VCHttpRetryRequest@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpRetryRequest@@@detail@boost@@
.?AVCHttpRetryRequest@@
.?AVCHttpRetryRequest@@
.?AVIHttpRequest@@
.?AVIHttpRequest@@
.?AV?$sp_counted_impl_p@VCAsyncHttpSession@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCAsyncHttpSession@@@detail@boost@@
.?AVCExecutorComInitializer@@
.?AVCExecutorComInitializer@@
.?AVIHttpSession@@
.?AVIHttpSession@@
.?AVCAbstractHttpSession@@
.?AVCAbstractHttpSession@@
.?AVCAsyncHttpSession@@
.?AVCAsyncHttpSession@@
.?AVCAbstractExecutorTask@@
.?AVCAbstractExecutorTask@@
.?AV?$sp_counted_impl_p@VCWinHttpWrapper@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCWinHttpWrapper@@@detail@boost@@
.?AVCWinHttpWrapper@@
.?AVCWinHttpWrapper@@
.?AVIHttpWrapper@@
.?AVIHttpWrapper@@
.?AV?$sp_counted_impl_p@VCExecutor@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCExecutor@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCSQLiteDB@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCSQLiteDB@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCMultiExecutor@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCMultiExecutor@@@detail@boost@@
.?AVCMultiExecutor@@
.?AVCMultiExecutor@@
.?AVIExecutor@@
.?AVIExecutor@@
.?AV?$sp_counted_impl_p@VCHttpResponse@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpResponse@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCLocalizationSupport@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCLocalizationSupport@@@detail@boost@@
.?AVCLocalizationSupport@@
.?AVCLocalizationSupport@@
.?AVILocalizationSupport@@
.?AVILocalizationSupport@@
.?AV?$sp_counted_impl_p@V?$map@_WV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@U?$less@_W@std@@V?$allocator@U?$pair@$$CB_WV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@@4@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$map@_WV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@U?$less@_W@std@@V?$allocator@U?$pair@$$CB_WV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@@4@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCRegKey@ATL@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCRegKey@ATL@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeProfileManager@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeProfileManager@@@detail@boost@@
.?AVCChromeProfileManager@@
.?AVCChromeProfileManager@@
.?AV?$sp_counted_impl_p@VCChromeCookieReader@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeCookieReader@@@detail@boost@@
.?AVCChromeCookieReader@@
.?AVCChromeCookieReader@@
.?AV?$sp_counted_impl_p@VCChromeProfilePreferences@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeProfilePreferences@@@detail@boost@@
.?AVCChromeProfilePreferences@@
.?AVCChromeProfilePreferences@@
.?AV?$sp_counted_impl_p@VCChromeExtensionPreferences@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCChromeExtensionPreferences@@@detail@boost@@
.?AVCChromeExtensionPreferences@@
.?AVCChromeExtensionPreferences@@
.?AV?$sp_counted_impl_p@VCFirefoxProfileManager@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxProfileManager@@@detail@boost@@
.?AVCFirefoxProfileManager@@
.?AVCFirefoxProfileManager@@
.?AV?$sp_counted_impl_p@VCFirefoxCookieReader@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxCookieReader@@@detail@boost@@
.?AVCFirefoxCookieReader@@
.?AVCFirefoxCookieReader@@
.?AV?$sp_counted_impl_p@VCFirefoxProfilePreferences@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxProfilePreferences@@@detail@boost@@
.?AVCFirefoxProfilePreferences@@
.?AVCFirefoxProfilePreferences@@
.?AV?$sp_counted_impl_p@VCFirefoxExtensionPreferences@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCFirefoxExtensionPreferences@@@detail@boost@@
.?AVCFirefoxExtensionPreferences@@
.?AVCFirefoxExtensionPreferences@@
.?AV?$sp_counted_impl_p@VCHttpRequest@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpRequest@@@detail@boost@@
.?AVIHttpRequestStateListener@@
.?AVIHttpRequestStateListener@@
.?AVIHttpErrorStateListener@@
.?AVIHttpErrorStateListener@@
.?AVIHttpStateListener@@
.?AVIHttpStateListener@@
.?AVIHttpHeaderDataListener@@
.?AVIHttpHeaderDataListener@@
.?AVIHttpSessionListener@@
.?AVIHttpSessionListener@@
.?AVCHttpRequest@@
.?AVCHttpRequest@@
.?AV?$sp_counted_impl_p@VIHttpSessionConfigurator@@@detail@boost@@
.?AV?$sp_counted_impl_p@VIHttpSessionConfigurator@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCExecutorLifecycleListeners@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCExecutorLifecycleListeners@@@detail@boost@@
.?AVIExecutorContext@@
.?AVIExecutorContext@@
.?AVCExecutor@@
.?AVCExecutor@@
.?AV?$sp_counted_impl_p@VCHttpSessionContext@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpSessionContext@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpHeaderData@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpHeaderData@@@detail@boost@@
.?AV?$sp_counted_impl_p@U?$pair@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@U?$pair@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$shared_ptr@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@boost@@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$shared_ptr@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@boost@@@std@@@6@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$shared_ptr@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@boost@@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V?$shared_ptr@V?$map@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@U?$pair@$$CBV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@V12@@std@@@4@@std@@@boost@@@std@@@6@@std@@@detail@boost@@
.?AVCSQLiteDB@@
.?AVCSQLiteDB@@
.?AVISQLiteDB@@
.?AVISQLiteDB@@
.?AVCSQLiteException@@
.?AVCSQLiteException@@
.?AV?$sp_counted_impl_p@VCHttpFileRetriever@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCHttpFileRetriever@@@detail@boost@@
.?AVCHttpFileRetriever@@
.?AVCHttpFileRetriever@@
.?AVIHttpFileRetriever@@
.?AVIHttpFileRetriever@@
.?AV?$sp_counted_impl_p@VCRegistryKey@@@detail@boost@@
.?AV?$sp_counted_impl_p@VCRegistryKey@@@detail@boost@@
.?AVCSQLiteQuery@@
.?AVCSQLiteQuery@@
.?AVCHttpSessionHandleConfigurator@@
.?AVCHttpSessionHandleConfigurator@@
.?AVIHttpSessionConfigurator@@
.?AVIHttpSessionConfigurator@@
.?AVCHttpConnectionHandleConfigurator@@
.?AVCHttpConnectionHandleConfigurator@@
.?AVCHttpRequestHandleConfigurator@@
.?AVCHttpRequestHandleConfigurator@@
.?AVCHttpSessionProxyConfigurator@@
.?AVCHttpSessionProxyConfigurator@@
.?AVCHttpSessionRequestSender@@
.?AVCHttpSessionRequestSender@@
.?AVIHttpSessionProcessor@@
.?AVIHttpSessionProcessor@@
.?AVCHttpSessionResponseReciever@@
.?AVCHttpSessionResponseReciever@@
.?AVCHttpSessionHeaderDataProcessor@@
.?AVCHttpSessionHeaderDataProcessor@@
.?AVCHttpSessionResponseBodyProcessor@@
.?AVCHttpSessionResponseBodyProcessor@@
.?AVCCyclicControl@ExecutorControls@@
.?AVCCyclicControl@ExecutorControls@@
.?AVCQueueControl@ExecutorControls@@
.?AVCQueueControl@ExecutorControls@@
.?AVIExecutorControl@@
.?AVIExecutorControl@@
.?AVCSQLiteTable@@
.?AVCSQLiteTable@@
.?AV?$sp_counted_impl_p@V?$vector@U?$RegistryValue@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@@V?$allocator@U?$RegistryValue@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@@@std@@@std@@@detail@boost@@
.?AV?$sp_counted_impl_p@V?$vector@U?$RegistryValue@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@@V?$allocator@U?$RegistryValue@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@@@std@@@std@@@detail@boost@@
012345678
012345678
!"#$%&'(
!"#$%&'(
THANK YOU FOR JOINING CONSUMER INPUT!
THANK YOU FOR JOINING CONSUMER INPUT!
The Consumer Input extension is able to identify survey reward opportunities with topics that you would be most likely to qualify for, optimizing your chances to earn rewards!
The Consumer Input extension is able to identify survey reward opportunities with topics that you would be most likely to qualify for, optimizing your chances to earn rewards!
s, Pol
s, Pol
MERCI DE REJOINDRE CONSUMER INPUT!
MERCI DE REJOINDRE CONSUMER INPUT!
En savoir plus, Charte de confidentialit
En savoir plus, Charte de confidentialit
Daha fazla bilgi, Gizlilik Politikas
Daha fazla bilgi, Gizlilik Politikas
9“9X:^:c:i:s:}:
9“9X:^:c:i:s:}:
3?3V3
3?3V3
6;7^7@8]8
6;7^7@8]8
3"3)30373
3"3)30373
8 8$8(8,8084888
8 8$8(8,8084888
9 9$9(9,90949
9 9$9(9,90949
4"494\4]5
4"494\4]5
9%9U:\:r:|:
9%9U:\:r:|:
5"5&5*5.556
5"5&5*5.556
?!?%?)?-?1?5?9?
?!?%?)?-?1?5?9?
02
02
7 7$7(7,707
7 7$7(7,707
> >$>(>,>0>
> >$>(>,>0>
0 0$0(0,0
0 0$0(0,0
= =$=(=,=
= =$=(=,=
2$2@2`2|2
2$2@2`2|2
2$202
2$202
- Attempt to initialize the CRT more than once.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- CRT not initialized
- floating point support not loaded
- floating point support not loaded
mscoree.dll
mscoree.dll
WUSER32.DLL
WUSER32.DLL
CI Chrome Install Notice
CI Chrome Install Notice
"%s" --new-window "%s"
"%s" --new-window "%s"
Chrome_RenderWidgetHostHWND
Chrome_RenderWidgetHostHWND
CI Chrome Install Notice: done - Google Chrome
CI Chrome Install Notice: done - Google Chrome
ScrollView::Viewport
ScrollView::Viewport
@Chrome_WidgetWin_1
@Chrome_WidgetWin_1
Add to Chrome
Add to Chrome
Consumer Input has been added to Chrome.
Consumer Input has been added to Chrome.
?userId=%s&panelId=%s
?userId=%s&panelId=%s
hXXp://VVV.consumerinput.com/panel/install/thanks/
hXXp://VVV.consumerinput.com/panel/install/thanks/
log.txt
log.txt
Kuser32.dll
Kuser32.dll
Global\{0DEADC47-D43F-4344-BB79-C87769BEFA87}
Global\{0DEADC47-D43F-4344-BB79-C87769BEFA87}
Global\{B50E68E0-857A-4E5B-B398-434489C6B3B4}
Global\{B50E68E0-857A-4E5B-B398-434489C6B3B4}
%s/0/0/%s/0/%s/NOSUBUSERID/0
%s/0/0/%s/0/%s/NOSUBUSERID/0
Software\Microsoft\Windows\Shell\Associations\UrlAssociations
Software\Microsoft\Windows\Shell\Associations\UrlAssociations
\http\UserChoice\ProgId
\http\UserChoice\ProgId
\https\UserChoice\ProgId
\https\UserChoice\ProgId
http\shell\open\command\
http\shell\open\command\
We were not able to close %s. Please close all %s windows and dialog boxes and click 'OK' to try again or 'Cancel' to abort uninstallation.
We were not able to close %s. Please close all %s windows and dialog boxes and click 'OK' to try again or 'Cancel' to abort uninstallation.
hXXps://sddcs.consumerinput.com/EClick
hXXps://sddcs.consumerinput.com/EClick
source=%s&event=%s&info=%s<=%s&cimtMachineID=%s
source=%s&event=%s&info=%s<=%s&cimtMachineID=%s
WEB_INSTALL_PAGE_OPEN
WEB_INSTALL_PAGE_OPEN
CIMT="%s", DCA="%s", enabled="%s", installType="%s", registeredInOmaha="%s", registeredInBrowser="%s", browser="%s", installTime="%s", activationTime="%s", profile="%s"
CIMT="%s", DCA="%s", enabled="%s", installType="%s", registeredInOmaha="%s", registeredInBrowser="%s", browser="%s", installTime="%s", activationTime="%s", profile="%s"
DCA="%s", %s="%s"
DCA="%s", %s="%s"
OS="%s", CIMT="%s", DCA="%s", status="%s"
OS="%s", CIMT="%s", DCA="%s", status="%s"
%s web-install triggered, opening "%s"... profile="%s"
%s web-install triggered, opening "%s"... profile="%s"
%s: %s set for '%s', profile="%s"
%s: %s set for '%s', profile="%s"
OS="%s", CIMT="%s", Omaha="%s", WinUser="%s", CIMIUninstaller="%s", EPM="%s", defaultBrowser="%s"
OS="%s", CIMT="%s", Omaha="%s", WinUser="%s", CIMIUninstaller="%s", EPM="%s", defaultBrowser="%s"
IE="%d", metroIE="%d", FF="%d", CR ="%d", metroCR="%d"
IE="%d", metroIE="%d", FF="%d", CR ="%d", metroCR="%d"
IsBhoRegistered="%s", IsEnabledViaPolicy="%s", IsExtensionApproved="%s", IsExtensionDisabled="%s", AutoEnableNewAddons="%s", AllowThirdpartyBrowserExtension="%s", ExtensionStatusChangeDisabled="%s", StatusInAddonList="%s", DenyAllAddons="%s"
IsBhoRegistered="%s", IsEnabledViaPolicy="%s", IsExtensionApproved="%s", IsExtensionDisabled="%s", AutoEnableNewAddons="%s", AllowThirdpartyBrowserExtension="%s", ExtensionStatusChangeDisabled="%s", StatusInAddonList="%s", DenyAllAddons="%s"
lastStatusReportTime
lastStatusReportTime
lastCookieReportTime
lastCookieReportTime
questionmarket.com
questionmarket.com
insightexpressai.com
insightexpressai.com
lastLifetimeReportTime
lastLifetimeReportTime
%sLastNotificationDisplayTime
%sLastNotificationDisplayTime
%sDisableNotifications
%sDisableNotifications
failed, unsupported browser version
failed, unsupported browser version
failed, operation has timed out
failed, operation has timed out
failed, UI Automation not supported
failed, UI Automation not supported
hXXp://auto.ria.com/search/?target=search&event=little&category_id=1&bodystyle[0]=7&chooseTypeSearchAuto=oldAutos&marka=0&model=0&state=0&s_yers=0&po_yers=0&price_ot=200000&price_do=¤cy=1#bodystyle[0]=7&countpage=10&category_id=1&view_type_id=0&page=0&marka=0&model=0&s_yers=0&po_yers=0&state=0&city=0&price_ot=200000&price_do=¤cy=1&gearbox=0&type=0&drive_type=0&door=0&color=0&metallic=0&engineVolumeFrom=&engineVolumeTo=&raceFrom=&raceTo=&powerFrom=&powerTo=&power_name=1&fuelRateFrom=&fuelRateTo=&fuelRatesType=city&custom=0&damage=0&saledParam=0&under_credit=0&confiscated_car=0&auto_repairs=0&with_exchange=0&with_real_exchange=0&exchangeTypeId=0&with_photo=0&with_video=0&is_hot=0&vip=0&checked_auto_ria=0&top=0&order_by=3&hide_black_list=0&auto_id=&auth=0&deletedAutoSearch=0&user_id=0&scroll_to_auto_id=0&expand_search=0&can_be_checked=0&last_auto_id=0&matched_country=-1&seatsFrom=&seatsTo=&wheelFormulaId=0&axleId=0&carryingTo=&carryingFrom=&search_near_states=0&company_id=0&company_type=0
hXXp://auto.ria.com/search/?target=search&event=little&category_id=1&bodystyle[0]=7&chooseTypeSearchAuto=oldAutos&marka=0&model=0&state=0&s_yers=0&po_yers=0&price_ot=200000&price_do=¤cy=1#bodystyle[0]=7&countpage=10&category_id=1&view_type_id=0&page=0&marka=0&model=0&s_yers=0&po_yers=0&state=0&city=0&price_ot=200000&price_do=¤cy=1&gearbox=0&type=0&drive_type=0&door=0&color=0&metallic=0&engineVolumeFrom=&engineVolumeTo=&raceFrom=&raceTo=&powerFrom=&powerTo=&power_name=1&fuelRateFrom=&fuelRateTo=&fuelRatesType=city&custom=0&damage=0&saledParam=0&under_credit=0&confiscated_car=0&auto_repairs=0&with_exchange=0&with_real_exchange=0&exchangeTypeId=0&with_photo=0&with_video=0&is_hot=0&vip=0&checked_auto_ria=0&top=0&order_by=3&hide_black_list=0&auto_id=&auth=0&deletedAutoSearch=0&user_id=0&scroll_to_auto_id=0&expand_search=0&can_be_checked=0&last_auto_id=0&matched_country=-1&seatsFrom=&seatsTo=&wheelFormulaId=0&axleId=0&carryingTo=&carryingFrom=&search_near_states=0&company_id=0&company_type=0
%s %s
%s %s
application/x-www-form-urlencoded; charset=UTF-8
application/x-www-form-urlencoded; charset=UTF-8
@%s;%s
@%s;%s
%Y%m%d
%Y%m%d
{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}
{B49699FC-1665-4414-A1CB-C4A2A4A13EEC}
Software\Microsoft\Windows\CurrentVersion\Ext\
Software\Microsoft\Windows\CurrentVersion\Ext\
Global\Install_%s_{D96CB9E8-13F9-46F9-9320-1CBE7C92AA57}
Global\Install_%s_{D96CB9E8-13F9-46F9-9320-1CBE7C92AA57}
%s=%s
%s=%s
consumerinput.com
consumerinput.com
SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Chrome
Chrome
chrome.exe
chrome.exe
\Google\Chrome\User Data\
\Google\Chrome\User Data\
hXXps://VVV.consumerinput.com/uninstall/chromeweb/?id=faoigfclahgbjjjaopddafnnapmeppnc
hXXps://VVV.consumerinput.com/uninstall/chromeweb/?id=faoigfclahgbjjjaopddafnnapmeppnc
To completely uninstall the Consumer Input software, you must remove the Consumer Input extension from your Google Chrome browser.
To completely uninstall the Consumer Input software, you must remove the Consumer Input extension from your Google Chrome browser.
Please follow the instructions below to remove the Chrome extension:
Please follow the instructions below to remove the Chrome extension:
1. From the Chrome window, click on the customize button (the "wrench" icon or the three horizontal bars in the top right corner of the browser)
1. From the Chrome window, click on the customize button (the "wrench" icon or the three horizontal bars in the top right corner of the browser)
profile.info_cache
profile.info_cache
.%s.name
.%s.name
.%s.active_time
.%s.active_time
extensions.known_disabled
extensions.known_disabled
extensions.settings.%s
extensions.settings.%s
.state
.state
.ack_external
.ack_external
.disable_reasons
.disable_reasons
.from_webstore
.from_webstore
Firefox
Firefox
firefox.exe
firefox.exe
MozillaWindowClass
MozillaWindowClass
\Mozilla\Firefox\
\Mozilla\Firefox\
profiles.ini
profiles.ini
extensions.sqlite
extensions.sqlite
extensions.json
extensions.json
prefs.js
prefs.js
extensions.ciff.dca.panelID
extensions.ciff.dca.panelID
extensions.ciff.dca.userID
extensions.ciff.dca.userID
extensions.ciff.machineID
extensions.ciff.machineID
extensions.ciff.version
extensions.ciff.version
extensions.ciff.dca.version
extensions.ciff.dca.version
extensions.ciff.dca.installTime
extensions.ciff.dca.installTime
extensions.ciff.dca.installType
extensions.ciff.dca.installType
extensions.ciff.disablePostInstall
extensions.ciff.disablePostInstall
user_pref\("%s", ?"([\w\{\}\.-] )"\);
user_pref\("%s", ?"([\w\{\}\.-] )"\);
extensions.ini
extensions.ini
cookies.sqlite
cookies.sqlite
iexplore.exe
iexplore.exe
dcabho.Dca
dcabho.Dca
Software\Microsoft\Windows\CurrentVersion\Policies\Ext
Software\Microsoft\Windows\CurrentVersion\Policies\Ext
ListBox_Support_CLSID
ListBox_Support_CLSID
{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}
{B3F80DB8-951F-4A2A-BE2F-ED6F4FF63B98}
{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}
{CC54C892-82DC-4D95-ACDE-8C84EF71C2CE}
{1138A907-2253-45d6-99C1-843A0AC58730}
{1138A907-2253-45d6-99C1-843A0AC58730}
{49C47E46-0DD3-4BCD-AF91-A14C104BD9DE}
{49C47E46-0DD3-4BCD-AF91-A14C104BD9DE}
{C7B061F6-380E-4545-86E3-400E3156FD28}
{C7B061F6-380E-4545-86E3-400E3156FD28}
0.0.0.0
0.0.0.0
Software\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer
Software\Microsoft\Windows\CurrentVersion\Uninstall\Consumer Input Installer
postinstallUrl
postinstallUrl
hXXps://VVV.consumerinput.com/installprompt/dca/chrome/?panelId=%s
hXXps://VVV.consumerinput.com/installprompt/dca/chrome/?panelId=%s
software\mozilla\Mozilla Firefox
software\mozilla\Mozilla Firefox
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
CKERNEL32.DLL
CKERNEL32.DLL
dwmapi.dll
dwmapi.dll
hXXp://
hXXp://
SOFTWARE\Microsoft\Windows NT\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\App Paths\
Software\Microsoft\Windows\CurrentVersion\App Paths\
Advapi32.dll
Advapi32.dll
$1"%d".$2
$1"%d".$2
C%s_timer
C%s_timer
%s_cancelEvent
%s_cancelEvent
C%s: %s
C%s: %s
CHTTP/1.1
CHTTP/1.1
C0xx
C0xx
Dbghelp.dll
Dbghelp.dll
Cres://%s/%d
Cres://%s/%d
%s %s.%d (%s).dmp
%s %s.%d (%s).dmp
CSELECT encrypted_value FROM cookies WHERE name = '%s' and host_key = '.%s'
CSELECT encrypted_value FROM cookies WHERE name = '%s' and host_key = '.%s'
SELECT name, encrypted_value FROM cookies WHERE host_key = '.%s'
SELECT name, encrypted_value FROM cookies WHERE host_key = '.%s'
\Local Storage\chrome-extension_%s_0.localstorage
\Local Storage\chrome-extension_%s_0.localstorage
(%s)|(%s)
(%s)|(%s)
(%s)|(%s)|(%s)
(%s)|(%s)|(%s)
%s_%s
%s_%s
CSELECT value FROM moz_cookies WHERE name = '%s' AND host = '.%s'
CSELECT value FROM moz_cookies WHERE name = '%s' AND host = '.%s'
SELECT name, value FROM moz_cookies WHERE host = '.%s'
SELECT name, value FROM moz_cookies WHERE host = '.%s'
C%s\%s
C%s\%s
\StringFileInfo\xx\%s
\StringFileInfo\xx\%s
E%s%scookie-retriever.exe
E%s%scookie-retriever.exe
%s -r %s
%s -r %s
%s -a
%s -a
%s -w %s %s
%s -w %s %s
%s -d %s
%s -d %s
%s; expires=%s
%s; expires=%s
CSELECT count(*) FROM addon WHERE id = '%s'
CSELECT count(*) FROM addon WHERE id = '%s'
SELECT count(*) FROM addon WHERE id = '%s' AND visible = 1 AND active = 1
SELECT count(*) FROM addon WHERE id = '%s' AND visible = 1 AND active = 1
SELECT count(*) FROM addon WHERE id = '%s' AND location NOT LIKE '%%winreg-app%%' AND visible = 1
SELECT count(*) FROM addon WHERE id = '%s' AND location NOT LIKE '%%winreg-app%%' AND visible = 1
SELECT descriptor FROM addon WHERE id = '%s' AND location LIKE '%%winreg-app%%'
SELECT descriptor FROM addon WHERE id = '%s' AND location LIKE '%%winreg-app%%'
UPDATE addon SET active = 1, userDisabled = 0, appDisabled = 0, softDisabled = 0 WHERE id = '%s' AND location LIKE '%%winreg-app%%'
UPDATE addon SET active = 1, userDisabled = 0, appDisabled = 0, softDisabled = 0 WHERE id = '%s' AND location LIKE '%%winreg-app%%'
.%s.id
.%s.id
.active
.active
.visible
.visible
.location
.location
.descriptor
.descriptor
.userDisabled
.userDisabled
.appDisabled
.appDisabled
.softDisabled
.softDisabled
sSQLITE_OK
sSQLITE_OK
SQLITE_ERROR
SQLITE_ERROR
SQLITE_INTERNAL
SQLITE_INTERNAL
SQLITE_PERM
SQLITE_PERM
SQLITE_ABORT
SQLITE_ABORT
SQLITE_BUSY
SQLITE_BUSY
SQLITE_LOCKED
SQLITE_LOCKED
SQLITE_NOMEM
SQLITE_NOMEM
SQLITE_READONLY
SQLITE_READONLY
SQLITE_INTERRUPT
SQLITE_INTERRUPT
SQLITE_IOERR
SQLITE_IOERR
SQLITE_CORRUPT
SQLITE_CORRUPT
SQLITE_NOTFOUND
SQLITE_NOTFOUND
SQLITE_FULL
SQLITE_FULL
SQLITE_CANTOPEN
SQLITE_CANTOPEN
SQLITE_PROTOCOL
SQLITE_PROTOCOL
SQLITE_EMPTY
SQLITE_EMPTY
SQLITE_SCHEMA
SQLITE_SCHEMA
SQLITE_TOOBIG
SQLITE_TOOBIG
SQLITE_CONSTRAINT
SQLITE_CONSTRAINT
SQLITE_MISMATCH
SQLITE_MISMATCH
SQLITE_MISUSE
SQLITE_MISUSE
SQLITE_NOLFS
SQLITE_NOLFS
SQLITE_AUTH
SQLITE_AUTH
SQLITE_FORMAT
SQLITE_FORMAT
SQLITE_RANGE
SQLITE_RANGE
SQLITE_ROW
SQLITE_ROW
SQLITE_DONE
SQLITE_DONE
CPPSQLITE_ERROR
CPPSQLITE_ERROR
%s[%d]: %s
%s[%d]: %s
%Program Files%\Consumer Input\Monitoring\dca-monitoring.exe
%Program Files%\Consumer Input\Monitoring\dca-monitoring.exe
{8856F961-340A-11D0-A96B-00C04FD705A2}
{8856F961-340A-11D0-A96B-00C04FD705A2}
9.9.9.9
9.9.9.9
dca-monitoring.exe
dca-monitoring.exe
3.2.0.762
3.2.0.762