Data Protection Removal Guide


See these Forums for Guides/Assistance

***************************************************************************************************

Statement From the Editor

If you have a question, ask in comment area, no sign in required

Click the Pic’s to Visit the Sites!

Read each guide at all links before starting the removal process so that you will know exactly what steps to take and which removal process is best for your issue

*************************************************************************************************

Data Protection is a rogue anti-spyware program from the same family as Digital Protection. This rogue is installed through the use of Trojans that pretend to be software updates or codecs required to view online videos. When the Trojan is run, it will install Data Protection on to your computer without your knowledge or consent. The rogue will then be configured to start automatically when Windows starts. When installed, the installer will also attempt to remove various anti-virus & anti-malware programs that are installed on your computer in order to protect itself from being removed. Some of the legitimate programs it attempts to uninstall are:

  • Malwarebytes’ Anti-Malware
  • F-Secure
  • Norton Internet Security
  • NOD32
  • Avira AntiVir
  • Agnitum Outpost Security Suite
  • McAfee
  • AVG8
  • AntiVir
  • avast!

When Data Protection is run it will automatically scan your computer and list a variety of infections, but will not allow you to remove any of them until you first purchase the program. The files it states are infections, though, either do not exist or are legitimate Microsoft files that are required for the proper operation of Windows. Therefore, do not manually delete any of the files it states are infections as you may cause problems with your computer.

It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If this is the case, then you will need to download the files suggested in this guide to another computer and then transfer them to the infected computer via a CD/DVD, external drive, or USB flash drive. A CD+R is best because it is read only and will prevent infecting the clean computer you have downloaded from if you have to use it to get more downloads. If this is not possible, see the RescueCD section on home page.

Step 1.

Bleeping Computer’s Data Protection (Uninstall Guide)

Print out these instructions as you will need to close every window that is open later in the fix.

Reboot your computer into Safe Mode with Networking. To do this, turn your computer off and then back on and immediately when you see anything on the screen, start tapping the F8 key on your keyboard. Eventually you will be brought to a menu similar to the one below:

Using the arrow keys on your keyboard, select Safe Mode with Networking and press Enter on your keyboard. If you are having trouble entering safe mode, then please use the following tutorial:

How to start Windows in Safe Mode

Download Malwarebytes’ Anti-Malware, or MBAM, from the following location and save it to your desktop:

mbam-setup.exe

Once downloaded, close all programs and Windows on your computer, including this one.

  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Update Malwarebytes’ Anti-Malware
    • Launch Malwarebytes’ Anti-Malware
  • Then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected.

See the Tutorial for specific instructions.

Malwarebytes’ Tutorial *****by Bleeping Computer

Complete all the steps in the Bleeping Computer guide first and then in normal windows mode do the same steps again to make sure that your computer is clean or see the suggestions if necessary below

RKill – What it does and What it Doesn’t – A brief introduction to the program

Rkill Download Links

Rkill.com
Rkill.exe

iExplore.exe

rkill.pif

rkill.scr

uSeRiNiT.exe

WiNlOgOn.exe

#1. do not turn off computer until after running Malwarebytes when using rkill or the process will have started again and you will have to start over.

#2. DO NOT USE ON A CLEAN COMPUTER as it could damage certain legit security programs. Disable all security software if possible to run

#3.Vista and Windows 7 users, right click and click run as administrator.

Disable security software before using rkill

How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs

Microsoft How to Get Rid of Malware

*************************************************************************************************

For Rootkit Removal if needed

How to Remove the TDSS,TDL3, or Alureon rootkit using TDSSKiller

Or ***Gmer***for rootkit’s

or*** HitmanPro***RootkitRevealer

Bleeping Computer’s    RootkitList

**************************************************************************************************

If no luck See

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help

OR

I’m infected – What do I do now?

Complete all the steps you can and post new topic—HERE

*************************************************************************************************

Self-Help Removal

ATF For cleaning of Temp Files & the Java cache

See Screenshots

<<<<<<<<<<<<<<<>>>>>>>>>>>>>>

Please download Malwarebytes’ Anti-Malware to your desktop.

The Free Version

See the Tutorial for specific instructions.

Malwarebytes’ Tutorial*****by VMSAR

If Malwarebytes’ will not install see*****HERE*****

Or*****HERE*****

When Malwarebytes’ will not run see*****HERE*****

Common Issues,Questions,and their Solutions

****************************************************

Step 2. If Needed But Suggested

The Free Version

SUPERAntiSpyware Tutorial

When SUPERAntiSpyware will not install or run see*****HERE*****

SUPERAntiSpyware Online Safe Scan

SUPERAntiSpyware Portable Scanner can be downloaded from a different computer and run on the infected computer. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled. It runs from the CD and requires NO internet connection. If the infected computer can not download, then this is a solution. Simply download the portable scanner and copy it to a USB/CD. NOTE: The portable scanner is random named to prevent the malware from stopping the scanner from running. For more software similar to this see the RescueCD software section on home page which scan an infected system and can recover personal data due to infection/defective or failing hard drive.

*********************************

Dr.Web CureIt!

***************************************

Ccleaner for a good clean-up

Screenshots

Ccleaner Documentation

<<<<<<<<<<>>>>>>>>>>

Step 3.

Uninstall all Adobe software and Java and install the latest versions

Adobe—>HERE

******************************

Use JavaRa to clean out old versions of Java>HERE

Then look for the following Java folders and if found delete them:

C:\Program Files\Java
C:\Program Files\Common Files\Java
C:\Windows\Sun
C:\Documents and Settings\All Users\Application Data\Java
C:\Documents and Settings\All Users\Application Data\Sun\Java
C:\Documents and Settings\username\Application Data\Java
C:\Documents and Settings\username\Application Data\Sun\Java

Then install new Java—>HERE

  • After the install is complete, go into the Control Panel (using Classic View) and double-click the Java Icon. (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cacheLeave BOTH Checked
        Applications and Applets
        Trace and Log Files
    • Click OK on Delete Temporary Files Window
      Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
    • Click OK to leave the Temporary Files Window
    • Click OK to leave the Java Control Panel.

To test your Java Run-time, you may go to this page  HERE

**************************************************************************************************

Step 4

Clean System Restore

Four steps to this. #1. Have your antivirus open or use the ESET Online Scanner below and set to full scan and running. #2. Turn off system restore. #3. Launch ATF and clean until “No Files Cleaned”. #4. When scan is finished, turn system restore back on and create a restore point.

NOTE: Make sure that your computer is clean before taking these steps.

See below for instructions on how to use System Restore.

XP

VISTA

WINDOWS 7

************************************************************************************************************************

NOTE
If you are having problems connecting your computer to the Internet after removing malware or spyware,

Try this Winsock Fix

*************************************************************************************************

If you are still having issues see

Virut and other File infectors-Throwing in the Towel?

When should I re-format?

How to Start Windows in Safe Mode

How to use the Task Manager

How to use the Microsoft Malicious Software Removal Tool

How to Install, reinstall, or uninstall Windows

*************************************************************************************************

Online Scanners

That Detect and Remove for Free!

*************************************************************************************************

Manual Removal Section Caution, a mistake here could cause operating system failure

Date Protection Associated Files:

c:\Documents and Settings\All Users\Application Data\fiosejgfse.dll
%Temp%\4otjesjty.mof
%Temp%\MSWINSCK.exe
%Temp%\wscsvc32.exe
%UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\Data Protection.lnk
%UserProfile%\Desktop\Data Protection Support.lnk
%UserProfile%\Desktop\Data Protection.lnk
%UserProfile%\Desktop\spam001.exe
%UserProfile%\Desktop\spam002.exe
%UserProfile%\Desktop\spam003.exe
%UserProfile%\Desktop\troj000.exe
%UserProfile%\Start Menu\Programs\Data Protection
%UserProfile%\Start Menu\Programs\Data Protection\About.lnk
%UserProfile%\Start Menu\Programs\Data Protection\Activate.lnk
%UserProfile%\Start Menu\Programs\Data Protection\Buy.lnk
%UserProfile%\Start Menu\Programs\Data Protection\Data Protection Support.lnk
%UserProfile%\Start Menu\Programs\Data Protection\Data Protection.lnk
%UserProfile%\Start Menu\Programs\Data Protection\Scan.lnk
%UserProfile%\Start Menu\Programs\Data Protection\Settings.lnk
%UserProfile%\Start Menu\Programs\Data Protection\Update.lnk
c:\Program Files\Data Protection
c:\Program Files\Data Protection\about.ico
c:\Program Files\Data Protection\activate.ico
c:\Program Files\Data Protection\buy.ico
c:\Program Files\Data Protection\dat.db
c:\Program Files\Data Protection\datext.dll
c:\Program Files\Data Protection\dathook.dll
c:\Program Files\Data Protection\datprot.exe
c:\Program Files\Data Protection\help.ico
c:\Program Files\Data Protection\scan.ico
c:\Program Files\Data Protection\settings.ico
c:\Program Files\Data Protection\splash.mp3
c:\Program Files\Data Protection\Uninstall.exe
c:\Program Files\Data Protection\update.ico
c:\Program Files\Data Protection\virus.mp3

Data Protection Windows Registry Information:

HKEY_CURRENT_USER\Software\Malware Defense
HKEY_CURRENT_USER\Software\Paladin Antivirus
HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}
HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection
HKEY_LOCAL_MACHINE\SOFTWARE\Malware Defense
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Data Protection
HKEY_LOCAL_MACHINE\SOFTWARE\Paladin Antivirus
HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = “1”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Data Protection”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “DisableTaskMgr” = “1”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved “{5E2121EE-0300-11D4-8D3B-444553540000}”

Issues that “may” be in a HijackThis log:

O4 – HKCU\..\Run: [Data Protection] “C:\Program Files\Data Protection\datprot.exe” -noscan

Have your HijackThis log analyzed*****HERE*****Copy your log and paste it in the box at the site and wait for the results. Scroll down the page and you will see a detailed description of each entry and suggestion actions to take,if any, with each, but before you do use SystemLookup below to double check the results. A mistake here can cause Operating System Failure!

Use*****SystemLookup*****as a reference resource for HijackThis

HijackThis Tutorial*****by BleepingComputer

Post your HijackThis log  HERE and I will advise what needs to be done. Please read the Tutorial so that you have a understanding of how this works.

********************************************************************************************************************************

If you run across a file that is not being detected or removed, you can upload the file to*****VIRUSTOTAL*****and they will analyze it and when the results are shown, it will give a list of what software’s are detecting the threat and which are removing it, kinda takes the guess work out of the equation.

More to use

Jotti’s Malware Scan

Dr. Web Online Check

Kaspersky File Scanner

*************************************************************************************************

Other Useful Infromation:

Virus Identification Resources

Security Software, Online Scanners and Virus Removal Tools

Video on “How to Remove Malware for Free” by Mirzo’s

Forums

************************************************************************************************


Advertisements

Posted May 8, 2010 by Wide Glide in Virus Removal

All Things Equal

A fine WordPress.com site

Everything Anti-Malware!

Reviews, Step-by-Step Guides,Toolkits and News

TechNet Blogs

Malware Removal

SUPERAntiSpyware Blog

Malware Removal

Security Garden

Malware Removal

S!Ri.URZ

Malware Removal

miekiemoes' Blog

Malware Removal

Malwarebytes Labs

Malware Removal

Metallica's blog

About malware

Malware Removal

Opera News

Malware Removal

WordPress.com

WordPress.com is the best place for your personal blog or business site.

%d bloggers like this: