The following files have been added to the system:
%TEMP%\badkfeho.exe:del
%WINDIR%\Tasks\Security Center Update - 135663007.job
%TEMP%\sprpqdw\srpohpm\wow.dll
%TEMP%\sprpqdw\srpohpm\wow.ini
%WINDIR%\SYSTEM32\naodqyuzd.exe
%APPDATA%\Ivikefe\ivhace.exe
The following files were temporarily written to disk then later removed:
%TEMP%\tmp1ed9d2da.bat
%TEMP%\badkfeho.exe
%TEMP%\dkfehoji.exe
The following registry elements have been created:
HKEY_CURRENT_USER\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\
HKEY_CURRENT_USER\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32\
HKEY_CURRENT_USER\SOFTWARE\CLASSES\CLSID\
HKEY_CURRENT_USER\SOFTWARE\MWMSCA\
HKEY_LOCAL_MACHINE\SOFTWARE\MWMSCA\
The following registry elements have been changed:
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\EFS\CURRENTKEYS\NUMBACKUPATTEMPTS = 4294967295
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\LYYNSUIQ = "%APPDATA%\Ivikefe\ivhace.exe"
HKEY_CURRENT_USER\SOFTWARE\MWMSCA\LICENSE = 999
HKEY_CURRENT_USER\SOFTWARE\MWMSCA\TASKS
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\DIRECTDRAW\MOSTRECENTAPPLICATION\ID = 1374709547
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\DIRECTDRAW\MOSTRECENTAPPLICATION\NAME = badkfeho.exe
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\LYYNSUIQ = "%APPDATA%\Ivikefe\ivhace.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\MWMSCA\LICENSE = 999
HKEY_LOCAL_MACHINE\SOFTWARE\MWMSCA\TASKS
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet\CONTROL\SESSION MANAGER\SUBSYSTEMS\WINDOWS = %WINDIR%\SYSTEM32\csrss.exe ObjectDirectory=\Windows SharedSection=[private subnet],512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ProfileControl=Off MaxRequestThreads=16
The applications attempted the following network connection(s):
67.50.19.**:80
hxxp://sdjghdjfgjfghh.com/b/eve/*****
109.163.239.***:80
188.165.232.**:80
hxxp://188.165.232.20/19ad89bc3e3c9d7ef68b89523eff1987/3.0/050/584cabc6-b3f0-4d52-b7e2-3ffbf17c3258/*****
hxxp://sdjghdjfgjfghh.com/b/opt/*****