Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Can't remove uacinit.dll


  • This topic is locked This topic is locked
6 replies to this topic

#1 Wizzle

Wizzle

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Location:Brooklyn, MI
  • Local time:08:25 PM

Posted 17 May 2009 - 10:24 PM

Please help! Malwarebytes scan found uacinit.dll and can't remove it. The MBAM log shows "Files Infected: C:\WINDOWS\system32\uacinit.dll (Trojan.Agent)". Once it's done scanning, MBAM says to reboot the computer to remove it, but when I scan again, I get the same thing; it never goes away.
Things I've tried: MBAM, Norton (which doesn't catch it at all - although an interesting thing is that now Norton's full scan doesn't scan all files anymore (only 5,000 of them) - it initially caught something called generic.200.process (or something like that) which it deleted, SuperAntiSpyware doesn't catch it at all...
I don't know where to go next; I've done some Google-searching and searching this forum... and I don't want to try any of the stuff I've read about without an experienced advisor walking me through it.
Other stuff: I'm on Windows XP, at some point I had to rename the MBAM executable to get it to open...

Any help will be greatly appreciated!

Edited by Wizzle, 17 May 2009 - 10:31 PM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:25 PM

Posted 17 May 2009 - 10:55 PM

Hi and welcome. Let's start here
Please post the scan log from MBAm...
the log is automatically saved and can be viewed by clicking the Logs tab in MBAM.


Next run ATF and SAS:
From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware

, Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you

should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Wizzle

Wizzle
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Location:Brooklyn, MI
  • Local time:08:25 PM

Posted 19 May 2009 - 06:41 AM

First off, thank you so much for your help!

Here is the most recent MBAm log:

Malwarebytes' Anti-Malware 1.36
Database version: 2142
Windows 5.1.2600 Service Pack 2

5/18/2009 07:24:42 PM
mbam-log-2009-05-18 (19-24-38).txt

Scan type: Full Scan (C:\|)
Objects scanned: 176568
Time elapsed: 35 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.


I followed your instructions - SAS didn't find anything. Here is the log, though:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/19/2009 at 03:11 AM

Application Version : 4.26.1002

Core Rules Database Version : 3899
Trace Rules Database Version: 1845

Scan type : Complete Scan
Total Scan Time : 05:51:58

Memory items scanned : 205
Memory threats detected : 0
Registry items scanned : 5745
Registry threats detected : 0
File items scanned : 76525
File threats detected : 0


As for how the PC is running now...
Restart sometimes causes it to freeze up. I can see all the icons on the desktop, but the taskbar doesn't finish booting up - I restarted at 6:21am this morning, and at 6:45 the system time in the notification area still showed 6:21am - I have to shut it down using the power button and start it back up again. Then it's fine.
Also, for fear of this being some scary backdoor thing, I've adjusted the firewall to the most secure setting, where I have to accept or block everything. This one C:\WINDOWS\system32\rasmans.dll keeps trying to get access, every couple of minutes at startup, then it stops. Does that make a difference for these scans at all? Should I set it back to standard?
Thanks!!

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,938 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:25 PM

Posted 19 May 2009 - 10:42 AM

uacinit.dll is related to a nasty variant of the TDSSSERV rootkit . Rootkits, backdoor Trojans, Botnets, and IRCBots are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. They can disable your anti-virus and security tools to prevent detection and removal. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker. To learn more about these types of infections, you can refer to:If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised and change each password using a clean computer, not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:Although the infection has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if the malware appears to have been removed. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired so you can never be sure that you have completely removed a rootkit. The malware may leave so many remnants behind that security tools cannot find them. Tools that claim to be able to remove rootkits cannot guarantee that all traces of it will be removed. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:Should you decide not to follow that advice, we will do our best to help clean the computer of any infections but we cannot guarantee it to be trustworthy or that the removal will be successful. Some infections are difficult to remove completely because of their morphing characteristics which allows the malware to regenerate itself. Sometimes there is another hidden piece of malware which has not been detected by your security tools that protects malicious files and registry keys (which have been detected) so they cannot be permanently deleted. Disinfection will probably require the use of more powerful tools than we recommend in this forum. Before that can be done you will need you to create and post a DDS/HijackThis log for further investigation.

Please read the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". If you cannot complete a step, then skip it and continue with the next. In Step 6 there are instructions for downloading and running DDS which will create a Pseudo HJT Report as part of its log.

When you have done that, post your log in the HijackThis Logs and Malware Removal forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. An expert will analyze your log and reply with instructions advising you what to fix. After doing this, we would appreciate if you post a link to your log back here so we know that your getting help from the HJT Team.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 Wizzle

Wizzle
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Location:Brooklyn, MI
  • Local time:08:25 PM

Posted 19 May 2009 - 02:52 PM

Oh wow. I was afraid you were going to say something like that. Yikes. :thumbsup:

A question about changing passwords, if you don't mind. We have 2 computers at our house, and we have a cable modem and a wireless router. The modem is connected to the wireless router, and both computers are hard-connected to the wireless router; we use the wireless part of the router only for the gaming systems.
Is the other machine safe from this rootkit? Can they gain access to that other machine just because both machines are connected through the same router? Would it be safer to connect the good machine directly to the modem for now, so I can get all the passwords changed? FWIW, I've run MBAm on this other machine as well, and it found no infections.

Thank you SO much for all your help!

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,938 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:25 PM

Posted 20 May 2009 - 06:45 AM

Sounds like your other machine was not infected. If it were, you would be experiencing similar symptoms and signs of infection.

Regardless, you should disconnect from the Internet and reset your router with a strong logon/password. Many users seldom change the default username/password on the router and are prone to certain types of infection. These are general instructions for how to reset a router:
  • Unplug or turn off your DSL/cable modem.
  • Locate the router's reset button.
  • Press, and hold, the Reset button down for 30 seconds.
  • Wait for the Power, WLAN and Internet light to turn on (On the router).
  • Plug in or turn on your modem (if it is separate from the router).
  • Open your web browser to see if you have an Internet connection.
  • If you don't have an Internet connection you may need to restart your computer.
For more specific information on your particular model, check the owner's manual. If you do not have a manual, look for one on the vendor's web site which you can download and keep for future reference.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,801 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:08:25 PM

Posted 22 May 2009 - 01:07 AM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/228610/infected-with-uacinitdll/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond. Please be patient. It may take a while to get a response but your log will be reviewed and answered as soon as possible

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users