Hi!
First, I wish you all the best to all the Virus "Threat Fighters" for the new 2015 year!!
Back to the business...
Sorry for the delayed answers, I have investigated and spent a lot of time in this issue and discovered some usefull informations. So, thanks to your last message, I found infection in the registry at differents locations. The virus seems to put install itself in each NTUSER.DAT file that constitue the hive registry linked to each user. I each ones, I find track of it, here what it is :
Found an "xsw" registry key in HKEY_CURRENT_USER\Software\ xsw\
Found an "cxsw" registry key in HKEY_CURRENT_LOCAL_MACHINE\Software\
Found multiples binary in HKEY_CURRENT_USER\Software\ AppDataLow\
Found an value "Rundll32" in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Deleting the xsw registry key, binaries in AppDataLow and rundll32 value in RUN key seems to be good because the antivirus stop to report the threat after the reboot. BUT, the cxsw still comes back after the first reboot and the virus seems to be always in the system, RogueKiller still reporting the injected process in explorer.exe and others.
So, that is what I can bring you as new informations. At this address,
http://users.hexanet.fr/~pereira/Virus.zip , you will find the dumps you asked, in differents formats to be sure you can exploit it. Anti-Malware doesn't solve anything, it even fail to report the infection...
Thanks again for your help, I hope that you will find the solution.
Best regards,
J. PEREIRA