Hi,
Would you be able to share what exactly this malware is attempting to do?
I can't as I don't know. No one from my users does not know how this malware at all arrived on their computers.
No one does not know the scource of the infections (dropers or live link to malware itself) so I can't test it myself in secured environment liek virutal mashines.
Until we get a valid malware/adware copy, little I can say except that it uses wPAD tehnology. My guesses are that this installation is attempted to be installed but avast! blocks its attempt and adware installation failed. But before it has been interrupted and blocked, installer adds some registry changes and avast! report them via his heuristics behavior but unable to process these leftovers as it should be, thus alearts.
Tell me will this fix your problem?
1. Open notepad and copy/paste the text present inside the code box below.
To do this highlight the contents of the box and right click on it. Paste this into the open notepad.
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to the operating system
CreateRestorePoint:
Reg: reg delete "HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad" /f
Reg: reg add "HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad" /f
Reg: reg add HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters /v SearchList /t REG_SZ /d "" /f
RemoveProxy:
Task: {7B1319EC-EDC9-4597-A75A-741766ECB9EB} - System32\Tasks\Run_dregol => d:\Users\Marc\AppData\Roaming\Run_dregol\UpdateProc\UpdateTask.exe <==== ATTENTION
Task: C:\Windows\Tasks\Run_dregol.job => d:\Users\Marc\AppData\Roaming\Run_dregol\UpdateProc\UpdateTask.exe <==== ATTENTION
File: d:\Users\Marc\AppData\Roaming\Run_dregol\UpdateProc\UpdateTask.exe
Reboot:
HKU\S-1-5-21-2148889511-2369990875-2801628819-1001\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dregol.com/?f=1&a=drg_camstd_15_27&cd=2XzuyEtN2Y1L1Qzu0F0C0A0AtCyEyByCtD0F0Bzz0A0BtBtDtN0D0Tzu0StCtBzztDtN1L2XzutAtFtCtCtFtAtFtBtN1L1Czu1StN1L1G1B1V1N2Y1L1Qzu2StD0B0DyCtB0A0FtCtGtB0AtA0CtGyE0EyC0BtGtDyByD0EtGyEyE0CtCyByCyD0ByD0F0Czy2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0AyCyEzzyD0EyEyBtGzzyCyDtAtGyEyDyBtBtGzy0CtD0FtGzyyBzytC0A0CtByEtCyDzztC2QtN0A0LzuyE&cr=1033540487&ir=
SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.dregol.com/results.php?f=4&q={searchTerms}&a=drg_camstd_15_27&cd=2XzuyEtN2Y1L1Qzu0F0C0A0AtCyEyByCtD0F0Bzz0A0BtBtDtN0D0Tzu0StCtBzztDtN1L2XzutAtFtCtCtFtAtFtBtN1L1Czu1StN1L1G1B1V1N2Y1L1Qzu2StD0B0DyCtB0A0FtCtGtB0AtA0CtGyE0EyC0BtGtDyByD0EtGyEyE0CtCyByCyD0ByD0F0Czy2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0AyCyEzzyD0EyEyBtGzzyCyDtAtGyEyDyBtBtGzy0CtD0FtGzyyBzytC0A0CtByEtCyDzztC2QtN0A0LzuyE&cr=1033540487&ir=
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.dregol.com/results.php?f=4&q={searchTerms}&a=drg_camstd_15_27&cd=2XzuyEtN2Y1L1Qzu0F0C0A0AtCyEyByCtD0F0Bzz0A0BtBtDtN0D0Tzu0StCtBzztDtN1L2XzutAtFtCtCtFtAtFtBtN1L1Czu1StN1L1G1B1V1N2Y1L1Qzu2StD0B0DyCtB0A0FtCtGtB0AtA0CtGyE0EyC0BtGtDyByD0EtGyEyE0CtCyByCyD0ByD0F0Czy2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0AyCyEzzyD0EyEyBtGzzyCyDtAtGyEyDyBtBtGzy0CtD0FtGzyyBzytC0A0CtByEtCyDzztC2QtN0A0LzuyE&cr=1033540487&ir=
SearchScopes: HKU\S-1-5-21-2148889511-2369990875-2801628819-1001 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.dregol.com/results.php?f=4&q={searchTerms}&a=drg_camstd_15_27&cd=2XzuyEtN2Y1L1Qzu0F0C0A0AtCyEyByCtD0F0Bzz0A0BtBtDtN0D0Tzu0StCtBzztDtN1L2XzutAtFtCtCtFtAtFtBtN1L1Czu1StN1L1G1B1V1N2Y1L1Qzu2StD0B0DyCtB0A0FtCtGtB0AtA0CtGyE0EyC0BtGtDyByD0EtGyEyE0CtCyByCyD0ByD0F0Czy2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0AyCyEzzyD0EyEyBtGzzyCyDtAtGyEyDyBtBtGzy0CtD0FtGzyyBzytC0A0CtByEtCyDzztC2QtN0A0LzuyE&cr=1033540487&ir=
SearchScopes: HKU\S-1-5-21-2148889511-2369990875-2801628819-1001 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.dregol.com/results.php?f=4&q={searchTerms}&a=drg_camstd_15_27&cd=2XzuyEtN2Y1L1Qzu0F0C0A0AtCyEyByCtD0F0Bzz0A0BtBtDtN0D0Tzu0StCtBzztDtN1L2XzutAtFtCtCtFtAtFtBtN1L1Czu1StN1L1G1B1V1N2Y1L1Qzu2StD0B0DyCtB0A0FtCtGtB0AtA0CtGyE0EyC0BtGtDyByD0EtGyEyE0CtCyByCyD0ByD0F0Czy2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0AyCyEzzyD0EyEyBtGzzyCyDtAtGyEyDyBtBtGzy0CtD0FtGzyyBzytC0A0CtByEtCyDzztC2QtN0A0LzuyE&cr=1033540487&ir=
2. Save notepad as fixlist.txt to your Desktop.
NOTE: => It’s important that both files, FRST and fixlist.txt are in the same location or the fix will not work.
3. Run FRST/FRST64 and press the Fix button just once and wait.
If the tool needed a restart please make sure you let the system to restart normally and let the tool completes its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.
Note: If the tool warned you about the outdated version please download and run the updated version.