TDSS or TDL3 is the name of a family of rootkits for the Windows operating system. It downloads and starts other malware on your computer and delivers advertisements to your computer, while it blocks certain programs from running. It infects your computer in several ways, such as replacing the hard disk drivers with malicious versions. Once a computer is infected, TDSS is invisible to Windows and any anti-malware programs. It continues downloading and running further malware and delivering more advertisements to your computer. These infections are detected under various names depending on the particular anti-virus vendor that you are using.
There are symptoms that the TDSS infection may display that you should watch out for:
The surest way to resolve this is to perform either a factory restore or clean Operating system install on your computer. Taking you through this is what is covered under our pro support warranty. You can also find articles taking you through this on the link page below:
As you can see, the TDSS rootkit is an intrusive infection that takes over your machine and is very difficult to remove.
Kaspersky Labs has released a tool called TDSSKiller that can be used to remove most variants of TDSS from your computer. There are other programs that do the same thing. You can use a different program. However, this software is free and it is the software I am most familiar with.
I have prepared a how-to guide below that shows you how to remove the virus - short of a full operating system reinstall. However this is not covered under your warranty and is carried out at your own risk.
The first thing that you must do is download TDSSKiller from the following link and save it to your desktop.
When you get to the above page, click on the TDSSKiller.exe link to download the file. If you are unable to download the file, then TDSS may be blocking it. You must download it first to a clean computer and then transfer it to the infected computer using a CD, DVD, external drive, or USB flash drive. Once the file has completed transfer, you should now have the TDSSKiller icon on your desktop.
(Figure.1 TDSSKiller Icon)
Before you run TDSSKiller for the first time, you must rename it. Right-click the TDSSKiller.exe icon on your Desktop and select Rename. Edit the name of the file to a random name with the .com extension.
For example: 123.com or abc.com If a random name does not work, then try renaming it to something like iexplore.com and run it again.
Double-click on it to launch it. When you run the program, Windows may display a warning message on the screen.
(Figure.2 Run Window)
If you receive this warning, click on the Run button to allow the program to run. If you did not see a warning, then TDSSKiller should have started already. Go to step 10, if so.
TDSSKiller starts and displays the welcome screen.
(Figure.3 Start Scan)
Click on the Start scan button to have it scan your computer for the infection.
When the scan has finished, it displays a result screen stating whether or not the infection was found on your computer. It displays a screen with a list of what it found.
(Figure.4 Scan Running)
To remove the infection, simply click on the Continue button and TDSSKiller attempts to remove the infection. If it does not give the option Cure, leave it at the default action of Skip and press the Continue button. Do not change it to Delete or Quarantine as it may delete infected files that are required for Windows to operate properly.
When it has finished cleaning the infection, you see a report.
(Figure.5 Scan Results)
If TDSSKiller cleans the TDSS infection, it may require a reboot to finish the cleaning process. Click on the Reboot now button to reboot your computer and finish the removal of the TDSS infection from your computer.
It is recommended to run a scan tool like Malwarebytes or a similar Malware scanner tool, to ensure everything is thoroughly scanned and cleaned. Ensure that you pick a tool that is well known and that you download it from the source. It is possible to re-infect your computer by downloading from unknown sources.