Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

TDSSkiller won't Run after Windows 7 recovery removal.


  • Please log in to reply
8 replies to this topic

#1 VinnyjitS

VinnyjitS

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 16 June 2011 - 03:05 PM

Hi everyone,


I'm using on Windows 7 professional box, and recently became infected with the Windows 7 recovery fake AV. I performed the removal process as instructed here: http://www.bleepingcomputer.com/virus-removal/remove-windows-7-recovery


Had to recreate a few shortcuts and run the unhide.exe program to be able to see my documents.


But firewall log picked up my machine talking to a bunch of different places outside my firewall, and I was getting browser redirects. So I tried running TDSSkiller but couldn't get the program to launch, even after renaming it.

I was able to run AVG anti-rootkit but it didnt pick up anything.

Any help would be greatly appreciated.

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:25 AM

Posted 16 June 2011 - 10:43 PM

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

======================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 VinnyjitS

VinnyjitS
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 17 June 2011 - 08:56 AM

Hi Broni thanks for the reply, here are the logs you requested:

=======================================================

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 6876

Windows 6.1.7601 Service Pack 1
Internet Explorer 9.0.8112.16421

6/17/2011 9:08:33 AM
mbam-log-2011-06-17 (09-08-33).txt

Scan type: Quick scan
Objects scanned: 257816
Time elapsed: 10 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

===================================================================================================================



GMER 1.0.15.15640 - http://www.gmer.net
Rootkit scan 2011-06-17 09:49:32
Windows 6.1.7601 Service Pack 1 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 IC35L090AVV207-0 rev.V23OA66A
Running: nqmoj1m6.exe; Driver: C:\Users\vfurtado\AppData\Local\Temp\pwliiaob.sys


---- System - GMER 1.0.15 ----

INT 0x51 ? 922A9058
INT 0x61 ? 922A92D8
INT 0x93 ? 922A97D8
INT 0xA3 ? 922A9A58
INT 0xB2 ? 922A9558

---- Kernel code sections - GMER 1.0.15 ----

.text ntoskrnl.exe!ZwSaveKey + 13CD 82849A09 1 Byte [06]
.text ntoskrnl.exe!KiDispatchInterrupt + 5A2 82869512 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
? System32\Drivers\spcy.sys The system cannot find the path specified. !
.text USBPORT.SYS!DllUnload 90364CA0 5 Bytes JMP 977FF4E0

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[1804] USER32.dll!EnableWindow 76318D02 5 Bytes JMP 6CB09884 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] USER32.dll!DialogBoxParamW 76333B9B 5 Bytes JMP 6CA615BB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] USER32.dll!DialogBoxIndirectParamW 76343B7F 5 Bytes JMP 6CC5590F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] USER32.dll!DialogBoxParamA 7635CF42 5 Bytes JMP 6CC558AA C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] USER32.dll!DialogBoxIndirectParamA 7635D274 5 Bytes JMP 6CC55974 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] USER32.dll!MessageBoxIndirectA 7636E869 5 Bytes JMP 6CC55831 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] USER32.dll!MessageBoxIndirectW 7636E963 5 Bytes JMP 6CC557B8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] USER32.dll!MessageBoxExA 7636E9C9 5 Bytes JMP 6CC55754 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] USER32.dll!MessageBoxExW 7636E9ED 5 Bytes JMP 6CC556F0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] WININET.dll!HttpAddRequestHeadersA 763F1B9C 5 Bytes JMP 00496A90
.text C:\Program Files\Internet Explorer\iexplore.exe[1804] WININET.dll!HttpAddRequestHeadersW 7643F7A8 5 Bytes JMP 00496C90
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] kernel32.dll!CreateThread 75F7375D 5 Bytes JMP 6CAC7133 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!EnableWindow 76318D02 5 Bytes JMP 6CB09884 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!CallNextHookEx 7631ABE1 5 Bytes JMP 6CB27AEF C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!UnhookWindowsHookEx 7631ADF9 5 Bytes JMP 6CB4EB70 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!DefWindowProcA 7631BB1C 7 Bytes JMP 6CAC9345 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!CreateWindowExA 7631BF40 5 Bytes JMP 6CAD3173 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!SetWindowsHookExW 7631E30C 5 Bytes JMP 6CB01FE4 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!CreateWindowExW 7631EC7C 5 Bytes JMP 6CB2FF57 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!DefWindowProcW 7632507D 7 Bytes JMP 6CB27B52 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!DialogBoxParamW 76333B9B 5 Bytes JMP 6CA615BB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!DialogBoxIndirectParamW 76343B7F 5 Bytes JMP 6CC5590F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!DialogBoxParamA 7635CF42 5 Bytes JMP 6CC558AA C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!DialogBoxIndirectParamA 7635D274 5 Bytes JMP 6CC55974 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!MessageBoxIndirectA 7636E869 5 Bytes JMP 6CC55831 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!MessageBoxIndirectW 7636E963 5 Bytes JMP 6CC557B8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!MessageBoxExA 7636E9C9 5 Bytes JMP 6CC55754 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] USER32.dll!MessageBoxExW 7636E9ED 5 Bytes JMP 6CC556F0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] ole32.dll!OleLoadFromStream 760D6143 5 Bytes JMP 6CC56110 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] ole32.dll!CoCreateInstance 76119D0B 5 Bytes JMP 6CB2B6D4 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] WININET.dll!HttpAddRequestHeadersA 763F1B9C 5 Bytes JMP 006C6A90
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] WININET.dll!HttpAddRequestHeadersW 7643F7A8 5 Bytes JMP 006C6C90
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] WS2_32.dll!closesocket 76093918 5 Bytes JMP 01DD000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] WS2_32.dll!getaddrinfo 76094296 5 Bytes JMP 01E0000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] WS2_32.dll!recv 76096B0E 5 Bytes JMP 01C1000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] WS2_32.dll!connect 76096BDD 5 Bytes JMP 01D8000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] WS2_32.dll!send 76096F01 5 Bytes JMP 01DE000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3568] WS2_32.dll!gethostbyname 760A7673 5 Bytes JMP 01DF000A

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT \SystemRoot\system32\drivers\pci.sys[ntoskrnl.exe!IoDetachDevice] [8366EDDC] \SystemRoot\System32\Drivers\spcy.sys
IAT \SystemRoot\system32\drivers\pci.sys[ntoskrnl.exe!IoAttachDeviceToDeviceStack] [8366EE30] \SystemRoot\System32\Drivers\spcy.sys
IAT \SystemRoot\system32\drivers\atapi.sys[ataport.SYS!AtaPortReadPortUchar] [83644042] \SystemRoot\System32\Drivers\spcy.sys
IAT \SystemRoot\system32\drivers\atapi.sys[ataport.SYS!AtaPortWritePortUchar] [836446D6] \SystemRoot\System32\Drivers\spcy.sys
IAT \SystemRoot\system32\drivers\atapi.sys[ataport.SYS!AtaPortWritePortBufferUshort] [83644800] \SystemRoot\System32\Drivers\spcy.sys
IAT \SystemRoot\system32\drivers\atapi.sys[ataport.SYS!AtaPortReadPortBufferUshort] [8364413E] \SystemRoot\System32\Drivers\spcy.sys

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs 84C771F8
Device \FileSystem\udfs \UdfsCdRom 84CA3500
Device \FileSystem\udfs \UdfsDisk 84CA3500
Device \Driver\volmgr \Device\VolMgrControl 84C731F8
Device \Driver\usbuhci \Device\USBPDO-0 961D11F8
Device \Driver\usbuhci \Device\USBPDO-1 961D11F8
Device \Driver\usbuhci \Device\USBPDO-2 961D11F8
Device \Driver\usbuhci \Device\USBPDO-3 961D11F8
Device \Driver\usbehci \Device\USBPDO-4 93AE5500

AttachedDevice \Driver\tdx \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\ACPI_HAL \Device\00000056 halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)
Device \Driver\volmgr \Device\HarddiskVolume1 84C731F8

AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)

Device \Driver\cdrom \Device\CdRom0 85C8B1F8
Device \Driver\atapi \Device\Ide\IdeDeviceP0T0L0-0 84C751F8
Device \Driver\atapi \Device\Ide\IdePort0 84C751F8
Device \Driver\atapi \Device\Ide\IdePort1 84C751F8
Device \Driver\atapi \Device\Ide\IdeDeviceP1T0L0-1 84C751F8
Device \Driver\cdrom \Device\CdRom1 85C8B1F8
Device \Driver\NetBT \Device\NetBt_Wins_Export 85F2E1F8

AttachedDevice \Driver\tdx \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\tdx \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\usbuhci \Device\USBFDO-0 961D11F8
Device \Driver\usbuhci \Device\USBFDO-1 961D11F8
Device \Driver\usbuhci \Device\USBFDO-2 961D11F8
Device \Driver\usbuhci \Device\USBFDO-3 961D11F8
Device \Driver\usbehci \Device\USBFDO-4 93AE5500
Device \Driver\NetBT \Device\NetBT_Tcpip_{14AD5C1A-0D47-4EF1-89BD-CEF0AA75A774} 85F2E1F8
Device \FileSystem\cdfs \Cdfs 85CD81F8

---- Threads - GMER 1.0.15 ----

Thread System [4:252] 85B3BE7A
Thread System [4:256] 85B3E008

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s2 285507792

---- EOF - GMER 1.0.15 ----

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:25 AM

Posted 17 June 2011 - 06:48 PM

It looks like you're still infected, but you'll have to travel to a higher level.

With the information you have provided I believe you will need help from the malware removal team. I would like you to start a new thread and post a DDS log HERE and include a link to this thread. Please make sure that you read the information about getting started before you start your thread.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient. Help is on the way!

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 VinnyjitS

VinnyjitS
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 20 June 2011 - 11:13 AM

This is for anyone else who might be reading this.


Broni, while I was waiting for your response I downloaded and ran Kaspersky Virus removal tool: http://www.kaspersky.com/virus-removal-tools , which found a MEM:Rootkit.Win32.TDSS.fa rootkit. After curing it and rebooting the machine, the browser redirects stooped, and my firewall log wasn't showing random traffic either. Then I was able to finally run TDSSkiller.

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:25 AM

Posted 20 June 2011 - 06:52 PM

Very well then.
Thanks for posting back :)

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 brian0918

brian0918

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 08 July 2011 - 09:38 PM

For anyone who has this problem and wants to get TDSSkiller to start:

I had this same issue today. Even though I tried renaming tdsskiller.exe to asdf.com, it still would not open. I guessed that the rootkit virus was examining the executable's description/company/product information (which Kaspersky foolishly includes in the file).

I found a utility called verpatch which modifies the tdsskiller file properties, using the following command:

verpatch tdsskiller.exe /s description "12345" /s company "asdf" /s product "qwerty" /s copyright "abc123"


After making this change, just right-click the tdsskiller and go to Properties, and you will see that the information has been changed.

Then just rename the program back to asdf.com, double-click it, and it may start up. In my case, it immediately found the rootkit, removed it, and now I am no longer experiencing the Google Redirect virus.

#8 VinnyjitS

VinnyjitS
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 21 July 2011 - 10:16 AM

Brian I downloaded the utility and tried running it but the window closed a couple of seconds later so I'm assuming you have to invoke it from the command prompt, which I did but it returned a "verpatch is not a recognizable command".

Could you tell us with more detail how to run the command?

Thanks!

#9 breathless

breathless

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:08:25 AM

Posted 10 August 2011 - 09:55 PM

I found a utility called verpatch which modifies the tdsskiller file properties, using the following command:

verpatch tdsskiller.exe /s description "12345" /s company "asdf" /s product "qwerty" /s copyright "abc123"


After making this change, just right-click the tdsskiller and go to Properties, and you will see that the information has been changed.

Then just rename the program back to asdf.com, double-click it, and it may start up. In my case, it immediately found the rootkit, removed it, and now I am no longer experiencing the Google Redirect virus.


Unfortunately, just as the last poster said, this command doesn't work.

"verpatch is not a recognizable command" is what it gives.

However, for those still interested in this, you can get a customized version of TDSSKiller directly from Kaspersky that has the company attributes removed from the exe file that allows it to start up without question. Enjoy!

TDSSKiller

NOTE: You need to register on their forums first before it will allow you to download the file at that link.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users