Help removing "background audio playing malware"

brian scanlon

New Member
Thread author
Jan 18, 2014
5
Any help would be appreciated. An additional entry is found in my "Volume Mixer", named 'name not available', which plays what appears to be several radio stations at the same time. Its also eating up process, and crashing my desktop every so often. Those are the only symptoms currently.

I followed the 9 step posted in the blog. With no effect. Shut computer down for the night.

Next day Installed "Trojankiller". Updated. Scanned. Nothing found. Uninstalled "Trojankiller.

Uninstalled Microsoft Windows Essential. Rebooted.

Visited the forum.

Did a FRST scan. Posted the two logs it generated.

Attempted AdwCleaner. Scan wont complete. Goes into 'pending mode', going nowhere. Have to open Task manager to shut it off.
 

Attachments

  • FRST.txt
    14.6 KB · Views: 153
  • Addition.txt
    14.8 KB · Views: 152

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Hi and welcome to the malwaretips.com forums!

I'm Kuttus and I am going to try to assist you with your problem. Please take note of the below:
  • I will start working on your malware issues, this may or may not, solve other issues you have with your machine.
  • The fixes are specific to your problem and should only be used for this issue on this machine!
  • The process is not instant. Please continue to review my answers until I tell you your machine is clear. Absence of symptoms does not mean that everything is clear.
  • If you don't know, stop and ask! Don't keep going on.
  • Please reply to this thread. Do not start a new topic.
  • Refrain from running self fixes as this will hinder the malware removal process.
  • It may prove beneficial if you print of the following instructions or save them to notepad as I post them.
Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.


Before we start:
Please be aware that removing malware is a potentially hazardous undertaking. I will take care not to knowingly suggest courses of action that might damage your computer. However it is impossible for me to foresee all interactions that may happen between the software on your computer and those we'll use to clear you of infection, and I cannot guarantee the safety of your system. It is possible that we might encounter situations where the only recourse is to re-format and re-install your operating system, or to necessitate you taking your computer to a repair shop.

Because of this, I advise you to backup any personal files and folders before you start.
------------------------------------------------------------------------------------------------------------------------------

Download attached fixlist.txt on the same location as FRST (otherwise the fix won't work)



Open FRST, and click Fix. Attach me that report after it is finished.

------------------------------------------------------------------------------------------------------------------------------

STEP 2 : Run a scan with Kaspersky TDSSKiller
  1. Download Kaspersky TDSKiller from the below link.
    KASPERKSY TDSSKILLER DOWNLOAD LINK (This link will automatically download Kaspersky TDSSKiller on your computer)
  2. Double-click on TDSSKiller.exe to run the application.
    tdss1.png
  3. Click Change parameters
    tdss2.png
  4. Check the boxes next to Verify Driver Digital Signature and Detect TDLFS file system, then click OK
    tdss3.png
  5. Click on the Start Scan button to begin the scan and wait for it to finish.
    NOTE: Do not use the computer during the scan!
  6. During the scan it will look similar to the image below:
    tdss4.jpg
  7. When it finishes, you will either see a report that no threats were found like below:
    tdss5.jpg

    If no threats are found at this point, just click the Report selection on the top right of the form to generate a log. A log file report will pop which you can just close since the report file is already saved.
  8. If any infection or suspected items are found, you will see a window similar to below:
    tdss7.jpg
    • If you have files that are shown to fail signature check do not take any action on these. Make sure you select Skip. I will tell you what to do with these later. They may not be issues at all.
    • If Suspicious objects are detected, the default action will be Skip. Leave the default set to Skip.
    • If Malicious objects are detected, they will show in the Scan results. TDSSKiller automatically selects an action (Cure or Delete) for malicious objects
      Make sure that Cure is selected. VERY IMPORTANT! - If Cure is not available, please choose Skip instead. DO NOT choose Delete unless instructed to do so.
  9. Click Continue to apply selected actions.
  10. A reboot may be required to complete disinfection. A window like the below will appear:
    tdss6.jpg

    Reboot immediately if TDSSKiller states that one is needed.
  11. Whether an infection is found or not, a log file should have already been created on your C: drive (or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_2.12.2012_14.17.04_log.txt which is based on the program version # and date and time run.
  12. Attach this log to your next reply.
 

Attachments

  • fixlist.txt
    728 bytes · Views: 81

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Once again we shall use FRST for additional checks. Re-run FRST/FRST64 by double-clicking:
  • Type rpcss.dll into the Search: field in FRST then click the Search File(s) button.
  • FRST will search your computer for files and when finished it will produce a log Search.txt in the same directory the tool is run.
  • Please attach it to your reply.
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Download attached fixlist.txt on the same location as FRST (otherwise the fix won't work)

Open FRST, and click Fix. Attach me that report after it is finished.
 

Attachments

  • fixlist.txt
    165 bytes · Views: 102

brian scanlon

New Member
Thread author
Jan 18, 2014
5
I think it worked. Everything looks good!! Its no longer showing up in my "Volume Mixer" and the process seems to be running smoothly. What exactly was the problem?

Thank you so much for all your assistance. You did an incredible job....and fast.
 

Attachments

  • Fixlog.txt
    1.9 KB · Views: 59
  • Like
Reactions: MalwareDetective

kuttus

Level 2
Verified
Oct 5, 2012
2,697
One of the Windows File was infected.
C:\Windows\System32\rpcss.dll
This one was the file making problems. We have replace that one with a Good one. That's how we fixed it... :)

Are you facing any other issues on the computer now?
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Now that your PC is clean, I recommend you to create a new System Restore point then purge the old ones after.

For XP
How to create a Restore Point in XP
Delete all restore points except the most recent one

For Vista
Create a restore point
Delete all but the most recent restore point

For Windows 7
Create a restore point
Delete all but the most recent restore point - Click the Delete all but the most recent restore point link




Keep your system updated
  • Keeping your programs (especially Adobe and Java products) updated is essential. Update Checker will notify you if any of your programs require an update.
  • Microsoft releases patches for Windows and Office products regularly to patch up Windows and Office product bugs and vulnerabilities.
  • Please ensure you update your system regularly and have automatic updates on. You can learn how to turn Automatic Updates on here



I also recommend you to switch your antivirus program to a better one. Here are some suggestions:

In addition to your antivirus, you need additional protection such as a firewall and behavioural blocker.


Here are only a few suggestions that will improve your system security. Should you wish to allow us to make full recommendations and set your PC up with maximum security, please start a thread here. Our community of PC enthusiasts and experts will give you feedback and help you secure your system from future malware infections.


Internet Explorer may be the most popular browser but it's definitely not the most secure browser. Consider using other browsers with addition add-ons to safeguard your system while browsing the internet.

Firefox is a more secure, faster browser than Internet Explorer. Firefox contains less vulnerabilities, reducing the risk of drive-by downloads. In addition, you can add the following add-ons to increase security.
  • KeyScramber - Encrypts your keystrokes to protect you against keyloggers that steals personal & banking information
  • AdBlock - Disable/blocks advertisements on websites so you won't accidentally click on a malicious ad.
  • NoScript - Disables Flash & Java contents to avoid exploits or drive-by attacks
  • Web of Trust - Shows the website rating by other users and blocks dangerous and poor-rated sites

Google Chrome is another good browser that is faster and more secure than Internet Explorer by having a sandbox feature. Additionally, you can add the following add-on to Chrome to heighten security.

Lastly, it is important to perform system maintenance on a regular basis. Here are a few tools and on-demand scanners that you should keep & use every 1-2 weeks to keep your system healthy.

Other than that, stay safe out there! If you have any other questions or concerns, feel free to ask :)


What's next?
  1. Bulild up your malware defenses by starting a new thread in Security Configuration Wizard forum.
  2. Learn how to avoid malware by reading this article How to easily avoid malware
  3. Be an active member in the MalwareTips community!
    smile.gif



My virus removal help is always free. Should you wish to show your appreciation via a donation, it will be much appreciated.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top