• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

How to remove TDSS, Backdoor.Tidserv, Alureon trojan/rootkit

Myantispyware team November 5, 2008    

TDSS trojan also known as Backdoor.Tidserv [PCTools], Backdoor.Tidserv.I!inf [Symantec], Rootkit.Win32.TDSS.y [Kaspersky Lab], Patched-SYSFile.a [McAfee], Mal/TDSSRt-A [Sophos], Virus:Win32/Alureon.F [Microsoft] is very dangerous. It installs onto your computer through a vulnerability in an already installed programs (mostly in InternetExplorer) or with the help of a rogue antispyware programs. Trojan TDSS uses rootkit-specific techniques designed to hide the software presence in the system. It is practically not detected by standard means Windows, you will not find its files on the disk, as well as writing about it in the Windows registry.

When installed, it will be configured to start automatically when Windows starts. While is running, TDSS (Backdoor.Tidserv, Alureon) trojan may:

  • display a lot of popups and fake security alerts
  • hijack Internet Explorer
  • redirect search results in Google, Yahoo, MSN to non related sites
  • block an access to security websites
  • disable Windows Task Manager, Windows Security Center and Registry editor

What is more, TDSS, Backdoor.Tidserv, Alureon trojan blocks the ability to run a lot of antivirus and antispyware programs, including Malwarebytes Anti-Malware. Also it is usually installed in conjunction with a rogue antispyware programs.

If your computer is infected with the trojan, then use these removal instructions below, which will remove TDSS, Backdoor.Tidserv, Alureon trojan and any associated malware for free.

Symptoms in a RootRepeal Log

Hidden Services
——————-
Service Name: H8SRTd.sys
Image Path: C:\WINDOWS\system32\drivers\H8SRTnfvywoxwtx.sys
Service Name: _VOIDd.sys
Image PathC:\WINDOWS\system32\drivers\_VOIDaabmetnqbf.sys

Use the following instructions to remove TDSS, Backdoor.Tidserv, Alureon trojan.

1. Use TDSSKiler by Kaspersky lab to detect and remove a rootkit.
2. Use Malwarebytes Anti-malware to remove TDSS, Backdoor.Tidserv, Alureon rootkits associated malware.

1. Use TDSSKiler by Kaspersky lab to detect and remove the TDSS rootkit.

Download TDSSKiller from th link above.

TDSSKiller download link.

Right click to it and select Extract all. Follow the prompts.

Open TDSSKiller folder. Double click the TDSSKiller icon to run it. You will a screen like below.

tdsskiller main menu

Click Start scan button to start scanning and disinfection process. Once the process is complete, your computer will be rebooted.

2. Use Malwarebytes Anti-malware to remove TDSS, Backdoor.Tidserv, Alureon rootkits associated malware.

Download MalwareBytes Anti-malware from the following link.

MalwareBytes Anti-malware download link.

Close all programs and Windows on your computer. Double Click mbam-setup.exe to install the application. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure a checkmark is placed next to Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware, then click Finish.

If an update is found, it will download and install the latest version.

Once the program has loaded you will see window similar to the one below.

mbam scanning

Click Scan Now button. It will start scanning your computer for TDSS, Backdoor.Tidserv, Alureon infection associated malware. This procedure can take some time, so please be patient.

When the scan is complete you will see a list of infected items similar as shown below. Note: list of infected items may be different than what is shown in the image below.

mbam removes operatingsystemerror

Make sure that everything is checked, and click Remove Selected for start TDSS, Backdoor.Tidserv, Alureon associated malware removal process. When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.

Note: if you need help with the instructions, then post your questions in our Spyware Removal forum.

TDSS, Backdoor.Tidserv, Alureon trojan creates the following files:

C:\Windows\System32\TDSS[RANDOM CHARACTERS].tmp
C:\Windows\System32\drivers\TDSS[RANDOM CHARACTERS].sys
C:\Windows\System32\TDSS[RANDOM CHARACTERS].sys
C:\Windows\System32\TDSS[RANDOM CHARACTERS].dat
C:\Windows\System32\TDSS[RANDOM CHARACTERS].log
C:\Windows\System32\TDSSserv.sys
C:\Windows\System32\TDSSerrors.log
C:\Windows\System32\TDSSservers.dat
C:\Windows\System32\TDSSl.dll
C:\Windows\System32\TDSSlog.
C:\Windows\System32\TDSSmain.dll
C:\Windows\System32\TDSSinit.dll
C:\Windows\System32\TDSSlog.dll
C:\Windows\System32\TDSSadw.dll
C:\Windows\System32\TDSSpopup.dll

TDSS, Backdoor.Tidserv, Alureon trojan creates the following registry keys and values

HKEY_LOCAL_MACHINE\SOFTWARE\TDSSserv
HKEY_LOCAL_MACHINE\SOFTWARE\TDSSserv\connections
HKEY_LOCAL_MACHINE\SOFTWARE\TDSSserv\disallowed
HKEY_LOCAL_MACHINE\SOFTWARE\TDSSserv\injector
HKEY_LOCAL_MACHINE\SOFTWARE\TDSSserv\versions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TDSSserv.sys

Rootkit Trojan Tutorials - HowTo
AlureonBackdoor.Tidservtdss

 Previous Post

How to remove Antivirus Pro 2009

Next Post 

How to remove Ultra Antivirus

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

169 Comments

  1. tim
    ― December 29, 2008 - 3:53 pm  Reply

    WOW…I nice end to a frustrating problem. Instructions worked as layed out and I seem to be TDSS free…Thanks!!!!!!!!!

  2. Lukasz
    ― December 30, 2008 - 6:00 am  Reply

    Great article and nasty trojan – I couldn’t have started system in normal mode, only safe worked. A lot of security pages were blocked and I was also unable to use system recovery. You helped me out of big trouble, thanks! 🙂

  3. DFINC
    ― December 30, 2008 - 10:39 pm  Reply

    It did work for me without downloading malware bytes, Thx for registry strings

  4. Steve h
    ― December 31, 2008 - 4:43 am  Reply

    Hi, please help
    I followed the above instructions correctly but when avenger went into reboot, my computer is in a startup loop. when windows starts to load it blacks out and attempts to start again.

    What can I do to fix this.

  5. Bean Counter
    ― December 31, 2008 - 10:24 am  Reply

    A heartfelt thankyou! Killed the trojan in one evening! This works!

  6. Bean Counter
    ― December 31, 2008 - 10:26 am  Reply

    Bless you! This really works! These remedies saved my PC! And the trojan and virus was permanently deleted in less than 3 hours! You are a Life Saver!

  7. Erin
    ― December 31, 2008 - 2:09 pm  Reply

    Thank you so much! I was driving myself nuts trying to get rid of this.

  8. Erin
    ― December 31, 2008 - 2:10 pm  Reply

    Thank you so much! I was driving myself nuts trying to get rid of this!

  9. tommy
    ― January 1, 2009 - 12:00 am  Reply

    i have a problem.. after that i have re booted the computer and checked that the TDSsserv is gone i still can`t acces the websites were i can download avenger and malwerebytes.. any ideas for what to do?

  10. Greg
    ― January 2, 2009 - 12:24 pm  Reply

    We are having the exact same symptons mentioned at the beginning of this thread, but there is no TDSServ files located on the server.

    It is probably named something else. Any idea how I can identify it?

    Thanks,

  11. Patrik
    ― January 2, 2009 - 8:25 pm  Reply

    Please follow these steps. I will help you.

  12. Tameem
    ― January 4, 2009 - 3:54 pm  Reply

    I just wanted to say thank you very much and this worked and i love u 🙂

  13. Rick
    ― January 5, 2009 - 9:28 am  Reply

    I had a variant that left files starting with “seneka???”. Nothing worked, although combofix detected it. However, every reboot combofix would detect it again. Here is how I fixed it. Only run this way if you are in the combofix reboot cycle and nothing else works!:

    1) Run combofix. If it detects the root kit write down the file names.

    2) Let combofix reboot your machine

    3) Boot into the Recovery Console (either from startup or from the XP CD)

    4) Login and at the command prompt type “fixmbr”. Answer ‘Y’ to the prompt.

    5) Go to the first directory identified by combofix. For example, on my machine it was

    c:\windows\system32\drivers\senekanisovjkq.sys

    so I typed “cd \windows\system32\drivers”

    6) do a directory listing to find all related files. BE CAREFUL TO USE ENOUGH CHARACTERS TO UNIQUELY IDENTIFY RELATED FILES! If you are not sure, I do not recommend that you proceed.

    dir seneka*.*

    7) Delete each file, one at a time (‘del’ in Recovery Console does not support wildcards).

    8) Repeat step 7 for all directories identified by combofix.

    9) Reboot normally

    10) Allow combofix to run again.

    11) Follow instructions

  14. Patrik
    ― January 5, 2009 - 9:42 am  Reply

    Rick, thank you for the information.

  15. Daimara
    ― January 5, 2009 - 7:11 pm  Reply

    I have a problem with the trojan too I did tried to follow the firts step displayed in this forum but it didn’t work for me because de files didn’t appear. So the name of the virus is Seneka971e7.tmp Please Help I already did a system restore and lost all of my pictures and important info.

  16. Patrik
    ― January 5, 2009 - 8:22 pm  Reply

    If in the list of drivers you have found Seneka971e7.tmp, than disable it. If you need help, then read and follow these steps.

  17. Loco
    ― January 6, 2009 - 9:34 am  Reply

    I am cannot boot my pc in normal mode only in safe mode and when the only option i have in device manager is unistall \

  18. Patrik
    ― January 6, 2009 - 9:50 am  Reply

    Then try it.

  19. p123dro
    ― January 7, 2009 - 7:08 pm  Reply

    thank’s God bless you from Puerto Rico it work’s perfect

  20. Paul
    ― January 11, 2009 - 1:36 pm  Reply

    Fantastic ! 4 days of banging my head against .tmp files, backdoor detections by symantec antivirus, deleting, rebooting just to have everything come back after reboot. Your instruction worked a treat. After running MBAM and rebooting I re-ran symantec and everything is clear. Very cool. I had to reboot a couple of times but my computer looks clean as a bell. THANK YOU …life saver.

  21. brian
    ― January 11, 2009 - 6:49 pm  Reply

    thank you Iam glad I found this site.

  22. John
    ― January 12, 2009 - 8:02 pm  Reply

    Thank you, Thank you, Thank you!!!!!!!!

    I fought with this POS for 12 hours.

  23. Randy N
    ― January 14, 2009 - 4:29 pm  Reply

    Thanks Bro! You’re the BEST! 4.5 hours of wasted time until I found your instructions.

  24. Richard911
    ― January 18, 2009 - 4:01 pm  Reply

    Downloaded Avenger but when the exe is executed Winrar throw up cannot execute, any ideas???

  25. Patrik
    ― January 18, 2009 - 5:26 pm  Reply

    Download avenger file to your Desktop, rigth click to avenger and select Extract.

  26. jeff
    ― January 20, 2009 - 6:15 am  Reply

    I found seneka but it comes up as a temp file. I looked on my computer none of the regs are in there.
    When I try to remove it everything I try it shuts down my computer. I tried all the software on this and many other sights. I use Macafee and a couple other malware things shredders don’t work. And I have to much stuff to reload.

  27. Mike-O
    ― January 20, 2009 - 9:25 pm  Reply

    YOU ARE THE BESTTTTTTTTTTTTTT!!!!!!!!!!!!!!!!!!

    thanks for sharing

  28. Patrik
    ― January 21, 2009 - 4:30 am  Reply

    Jeff, read and follow these steps.

  29. Ehab
    ― January 22, 2009 - 2:09 am  Reply

    Thank you veryyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy much. really you are Brilliant.
    You save many computers.

  30. Huw
    ― January 27, 2009 - 12:07 am  Reply

    Thank you so much. My pc got so jammed up I couldnt download Avanger or Malware. So I downloaded them to a USB memory stick on another PC and then booted them on the infected PC from stick… Brilliant got on and followed your excellent instructions. Now working again properly.
    I dont understand why an up to date McAfee didnt sort it out first, its supposed to.
    Anyway thanks again for well worded instructions

« Previous 1 2 3 4 … 6 Next »

Leave a Reply to sergio Cancel reply

New Guides

scam alert
Remove Searchernow.com Redirect: Chrome, Edge, Firefox
Avoid the ExLig.com Bitcoin Scam: Insights on Promo Code Frauds
scam alert
Denwex.com Review: Bitcoin Promo Codes as a Scam
scam alert
CEFOLEX.com Review: A Closer Look at the Bitcoin Promo Code Scam
The Bigexcoin.com Bitcoin Promo Code Scam: How to Stay Safe

Follow Us

Search

Useful Guides

Best free malware removal tools
Best Free Malware Removal Tools 2025
Tech Support Scam
Remove Tech Support Scam pop-up virus [Microsoft & Apple Scam]
How to reset Internet Explorer settings to default
remove android virus
How to remove virus from Android phone
browser redirect virus
How to remove Browser redirect virus [Chrome, Firefox, IE, Edge]

Recent Guides

How to remove Antivirus Pro 2009
How to remove Trojan-Keylogger.WIN32.Fung (fake Windows Security Alert)
How to remove Personal Defender 2009
How to remove WinDefender 2009
Removal instructions for Real Antivirus

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.