User Protection Removal Guide

See these Forums for Guides/Assistance


Statement From the Editor

If you have a question, ask in comment area, no sign in required

Click the Pic’s to Visit the Sites!

Read each guide at all links before starting the removal process so that you will know exactly what steps to take and which removal process is best for your issue


User Protection is a rogue anti-spyware program from the same family as Paladin Antivirus. This rogue is promoted and installed through the use of malware that automatically downloads and installs it onto your computer without your consent or knowledge. Once downloaded and installed, User Protection will scan your computer for certain legitimate anti-virus programs that may be installed on your computer. If they are detected, Use Protection will state they are infections and prompt you to uninstall them. It does this in order to protect itself from the legitimate programs that may flag User Protection as an infection. The anti-malware programs that it tries to uninstall include:

  • F-Secure
  • NOD32
  • Malwarebytes’ Anti-Malware
  • Norton Internet Security
  • Avira AntiVir
  • AVG8
  • AntiVir
  • Agnitum Outpost Security Suite
  • avast!

User Protection will then start and begin to scan your computer for infections. Once the scan has finished it will state that there are numerous infections on your computer, but will not allow you to remove them until you purchase the program. The infections it finds, though, either do not exist or are legitimate programs on your computer, which if you remove , may affect the proper operation of the computer. Therefore, please do not attempt to manually remove any of the files it states are infections as you may accidentally delete a legitimate Windows file.

It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If this is the case, then you will need to download the files suggested in this guide to another computer and then transfer them to the infected computer via a CD/DVD, external drive, or USB flash drive. A CD+R is best because it is read only and will prevent infecting the clean computer you have downloaded from if you have to use it to get more downloads. If this is not possible, see the  RescueCD section on home page.

Step 1.

Bleeping Computer’s User Protection (Uninstall Guide)

Use the rkill as instructed in BleepingComputer’s guide, try all three if necessary. If those will not work try the rkill from *****MajorGeeks*****They are actually from BleepingComputer, just MajorGeeks has the links to the rkill. Then use Malwarebytes’ as instructed.

RKill – What it does and What it Doesn’t – A brief introduction to the program

Rkill Download Links






#1. do not turn off computer until after running Malwarebytes when using rkill or the process will have started again and you will have to start over.

#2. DO NOT USE ON A CLEAN COMPUTER as it could damage certain legit security programs. Disable all security software if possible to run

#3.Vista and Windows 7 users, right click and click run as administrator.

Disable security software before using rkill

How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs

Malwarebytes’ Tutorial

Microsoft How to Get Rid of Malware


Rootkit Removal

How to Remove the TDSS,TDL3, or Alureon rootkit using TDSSKiller

Or ***Gmer***for rootkit’s

or*** HitmanPro***RootkitRevealer

Bleeping Computer’s    RootkitList


If no luck See

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help


I’m infected – What do I do now?

Complete all the steps you can and post new topic—HERE


Repair-Bots Online Support

Computer Support and Diagnostics


ATF For cleaning of Temp Files & the Java cache

See Screenshots


Malwarebytes’ Anti-Malware

Please download Malwarebytes’ Anti-Malware to your desktop.

Click the Free Version

  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Update Malwarebytes’ Anti-Malware
    • Launch Malwarebytes’ Anti-Malware
  • Then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected.

See the Tutorial for specific instructions.

Malwarebytes’ Tutorial

If Malwarebytes’ will not install see*****HERE*****


When Malwarebytes’ will not run see*****HERE*****

Common Issues,Questions,and their Solutions

Step 2. If Needed


SUPERAntiSpyware Tutorial

When SUPERAntiSpyware will not install or run see*****HERE*****

SUPERAntiSpyware Online Safe Scan

SUPERAntiSpyware Portable Scanner can be downloaded from a different computer and run on the infected computer. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled. It runs from the CD and requires NO internet connection. If the infected computer can not download, then this is a solution. Simply download the portable scanner and copy it to a USB/CD. NOTE: The portable scanner is random named to prevent the malware from stopping the scanner from running. For more software similar to this see the RescueCD software section on home page which scan an infected system and can recover personal data due to infection/defective or failing hard drive.

Dr.Web CureIt!


Ccleaner for a good clean-up


Ccleaner Documentation


Step 3.

Uninstall all Adobe software and Java and install the latest versions



Use JavaRa to clean out old versions of Java>HERE

Then look for the following Java folders and if found delete them.

C:\Program Files\Java
C:\Program Files\Common Files\Java
C:\Documents and Settings\All Users\Application Data\Java
C:\Documents and Settings\All Users\Application Data\Sun\Java
C:\Documents and Settings\username\Application Data\Java
C:\Documents and Settings\username\Application Data\Sun\Java

Then install new Java—>HERE

  • After the install is complete, go into the Control Panel (using Classic View) and double-click the Java Icon. (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cacheLeave BOTH Checked
        Applications and Applets
        Trace and Log Files
    • Click OK on Delete Temporary Files Window
      Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
    • Click OK to leave the Temporary Files Window
    • Click OK to leave the Java Control Panel.

To test your Java Run-time, you may go to this page  HERE


Step 4

Clean System Restore

Four steps to this. #1. Have your antivirus open or use the ESET Online Scanner below and set to full scan and running. #2. Turn off system restore. #3. Launch ATF and clean until “No Files Cleaned”. #4. When scan is finished, turn system restore back on and create a restore point.

NOTE: Make sure that your computer is clean before taking these steps.

See below for instructions on how to use System Restore.





If you are having problems connecting your computer to the Internet after removing malware or spyware,

Try this Winsock Fix


If you are still having issues see

Virut and other File infectors-Throwing in the Towel?

When should I re-format?

VMSAR Virus/Rogue Removal Guide

How to Start Windows in Safe Mode

How to use the Task Manager

How to use the Microsoft Malicious Software Removal Tool

How to Install,reinstall, or uninstall Windows

Security Software, Online Scanners and Virus Removal Tools


Online Scanners

That Detect and Remove for Free!


Manual Removal Section: Caution, a mistake here could cause operating system failure.   😦

User Protection Associated Files:

c:\Documents and Settings\All Users\Application Data\fiosejgfse.dll
c:\Program Files\User Protection
c:\Program Files\User Protection\about.ico
c:\Program Files\User Protection\activate.ico
c:\Program Files\User Protection\buy.ico
c:\Program Files\User Protection\help.ico
c:\Program Files\User Protection\scan.ico
c:\Program Files\User Protection\settings.ico
c:\Program Files\User Protection\splash.mp3
c:\Program Files\User Protection\uninstall.exe
c:\Program Files\User Protection\update.ico
c:\Program Files\User Protection\usr.db
c:\Program Files\User Protection\usrext.dll
c:\Program Files\User Protection\usrhook.dll
c:\Program Files\User Protection\usrprot.exe
c:\Program Files\User Protection\virus.mp3
%UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\User Protection.lnk
%UserProfile%\Desktop\User Protection Support.lnk
%UserProfile%\Desktop\User Protection.lnk
%UserProfile%\Local Settings\Temp\4otjesjty.mof
%UserProfile%\Local Settings\Temp\usr.dat
%UserProfile%\Local Settings\Temp\usrr.dat
%UserProfile%\Start Menu\Programs\User Protection
%UserProfile%\Start Menu\Programs\User Protection\About.lnk
%UserProfile%\Start Menu\Programs\User Protection\Activate.lnk
%UserProfile%\Start Menu\Programs\User Protection\Buy.lnk
%UserProfile%\Start Menu\Programs\User Protection\Scan.lnk
%UserProfile%\Start Menu\Programs\User Protection\Settings.lnk
%UserProfile%\Start Menu\Programs\User Protection\Update.lnk
%UserProfile%\Start Menu\Programs\User Protection\User Protection Support.lnk
%UserProfile%\Start Menu\Programs\User Protection\User Protection.lnk

User Protection Windows Registry Information:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\User Protection
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “User Protection”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved “{5E2121EE-0300-11D4-8D3B-444553540000}”

Issues that “may” be in a HijackThis log:

O4 – HKCU\..\Run: [User Protection] “C:\Program Files\User Protection\usrprot.exe” -noscan

Have your HijackThis log analyzed*****HERE*****Copy your log and paste it in the box at the site and wait for the results. Scroll down the page and you will see a detailed description of each entry and suggestion actions to take,if any, with each, but before you do use SystemLookup below to double check the results. A mistake here can cause Operating System Failure

Use***SystemLookup***as a reference resource for HijackThis

HijackThis Tutorial*****by BleepingComputer


If you run across a file that is not being detected or removed, you can upload the file to***VIRUSTOTAL***and they will analyze it and when the results are shown, it will give a list of which software is detecting the threat and which are removing it, kinda takes the guess work out of the equation.

More to use

Jotti’s Malware Scan

Dr. Web Online Check

Kaspersky File Scanner


Other Useful Infromation:

Virus Identification Resources

Video on “How to Remove Malware for Free” by Mirzo’s



Posted March 21, 2010 by Wide Glide in Virus Removal

All Things Equal

A fine site

Everything Anti-Malware!

Reviews, Step-by-Step Guides,Toolkits and News

TechNet Blogs

Malware Removal

SUPERAntiSpyware Blog

Malware Removal

Security Garden

Malware Removal


Malware Removal

miekiemoes' Blog

Malware Removal

Malwarebytes Labs

Malware Removal

Metallica's blog

About malware

Malware Removal

Opera News

Malware Removal is the best place for your personal blog or business site.

%d bloggers like this: