Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

Data Protection Removal and Analysis

by Shanmuga| Tweet This | Google +1 | Facebook | Stumble It | Reddit | Digg | del.icio.us

Data Protection is a malicious, fraudulent security software that uses a variety of fake system alerts to scare the users into buying a subscription. It initiates a fake system scan at every system start and purportedly finds many non-existent malware infections. This scareware:

  • Installs TDSS rootkit
  • Disables TaskManager
  • Disables Command prompt, Registry editor
  • Prompts to uninstall legitimate security software
  • Installs a version of Fake Windows Security Center
  • Drops internet shortcuts to porn sites on the desktop
  • Doesn’t allow running of certain security software

Scareware like Data Protection are commonly installed when users are redirected to fake online scanner pages or fake ‘video codec required’ pages distributed through out the Web by cyber criminals using blackhat SEO techniques, Spam and Malicious flash advertisements.

data protection 06 Data Protection Removal and Analysis

Desktop hijacked by Data Protection

Data Protection Removal (How to remove Data Protection)

MalwareBytes’s Anti-Malware Free edition (mbam-setup.exe) was able to remove this infection.

  1. Boot in to Windows Safe Mode with networking
  2. Download MalwareBytes’s Anti-Malware Free edition (mbam-setup.exe) or from a clean computer download and copy to a removable drive like CD, DVD or USB flash drive.
  3. Double-click mbam-setup.exe to start the installation. Proceed with installation following the prompts. Make sure that the following option is checked when you finish the installation: Update Malwarebytes’ Anti-Malware.
  4. Once the update is completed, Launch Malwarebytes’ Anti-Malware and select Perform full scan in the Scanner tab. When the scan is completed, click “Show results“, confirm that all instances of the rogue security software are check-marked and then click “Remove Selected” to delete them. If prompted restart immediately to complete the removal process.
  5. Turn System Restore off and on.

You should now be clean of this rogue.

The full version of Malwarebytes’ Anti-Malware performs brilliantly against scareware such as Data Protection. The real-time component of the paid version includes dynamic blocking of malicious websites, servers and prevents execution of malware. It would caution you before most rogue security software could install itself. Please consider purchasing the Malwarebytes’ Anti-Malware Full version for additional protection.

Data Protection Analysis

A rogue security software such as Data Protection belongs to a family of software products that call themselves as antivirus, antispyware or registry cleaners and often use deceptive or high pressure sales tactics and deliberate false positives to convince users into buying a license/subscription. They are often repackaged and renamed. They do not actually remove malware instead many of them add more malware of their own. They need to be removed immediately from your system.

The trojan downloader was named install.exe and 29184 bytes in size. It was detected by 19/41 (46.35%) of the antivirus engines available at VirusTotal.

This scareware is known by the following aliases:

  • Win32:Jifas-FN
  • Trojan-Downloader:W32/Agent.DJEW
  • W32/TDSSPack.BCXU!tr
  • DNSChanger.bo
  • Trojan:Win32/Alureon.DA
  • Mal/TDSSPack-Q

Typical Data Protection Scare Messages

Most of the viruses and worms on your PC because of visiting pornosites or warez/torrent sites.

Dangerous system protection has detected a virus or a harmful program on your computer! They may corrupt your information or send it to hackers.

Warning! Antivirus is run in demo mode. Activate your antivirus otherwise all the data will be lost or damaged!

Harmful viruses detected on your computer. Click on the message to scan your computer for security threats for free.

Unauthorized person tries to steal your passwords and private information. Click on the message to prevent identity theft.

It is strongly recommended to remove all detected viruses to protect your computer against existing security threats. Click on the message to ensure the protection of your computer.

Network attack has been detected. Process is attempting to access your private data.

Network intrusion detected! your computer is being attacked from a remote PC.

Users should not fall for the false alerts of system infection and buy the scareware to ‘clean’ the system. If you purchased one by entering your credit card number at a rogue software website, it would be prudent to:

  • Immediately contact the bank that issued the card and dispute the charges.
  • Request them to not allow any further transaction and cancel the card. You may also request them to issue a new card with a different number.

Data Protection Associated Files and Folders

  • C:\Documents and Settings\All Users\Favorites\_favdata.dat
  • C:\Documents and Settings\malwarehelp.org\Application Data\Microsoft\Internet Explorer\Quick Launch\Data Protection.lnk
  • C:\Documents and Settings\malwarehelp.org\Desktop\Data Protection Support.lnk
  • C:\Documents and Settings\malwarehelp.org\Desktop\Data Protection.lnk
  • C:\Documents and Settings\malwarehelp.org\Desktop\nudetube.com.lnk
  • C:\Documents and Settings\malwarehelp.org\Desktop\pornotube.com.lnk
  • C:\Documents and Settings\malwarehelp.org\Desktop\spam001.exe
  • C:\Documents and Settings\malwarehelp.org\Desktop\spam003.exe
  • C:\Documents and Settings\malwarehelp.org\Desktop\troj000.exe
  • C:\Documents and Settings\malwarehelp.org\Desktop\youporn.com.lnk
  • C:\Documents and Settings\All Users\Application Data\pragmamfeklnmal.dll
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\2a6.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\PRAGMA8dbe.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\3ee.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\601.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\63.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\asd4.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\asd6.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\asd6.tmp.exe
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\asd8.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\asd8.tmp.exe
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\asd9.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\asd9.tmp.exe
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\dat.dat
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\datr.dat
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\dhdhtrdhdrtr5y
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\f637.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\kernel64xp.dll
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\MSWINSCK.exe
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\test.reg
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\TMP18036.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\TMP20786.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\wscsvc32.exe
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\~DFA9B7.tmp
  • C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\pragmamainqt.dll
  • C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Data Protection\About.lnk
  • C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Data Protection\Activate.lnk
  • C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Data Protection\Buy.lnk
  • C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Data Protection\Data Protection Support.lnk
  • C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Data Protection\Data Protection.lnk
  • C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Data Protection\Scan.lnk
  • C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Data Protection\Settings.lnk
  • C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Data Protection\Update.lnk
  • C:\Program Files\Data Protection\about.ico
  • C:\Program Files\Data Protection\activate.ico
  • C:\Program Files\Data Protection\buy.ico
  • C:\Program Files\Data Protection\dat.db
  • C:\Program Files\Data Protection\datext.dll
  • C:\Program Files\Data Protection\dathook.dll
  • C:\Program Files\Data Protection\datprot.exe
  • C:\Program Files\Data Protection\help.ico
  • C:\Program Files\Data Protection\scan.ico
  • C:\Program Files\Data Protection\settings.ico
  • C:\Program Files\Data Protection\splash.mp3
  • C:\Program Files\Data Protection\Uninstall.exe
  • C:\Program Files\Data Protection\update.ico
  • C:\Program Files\Data Protection\virus.mp3
  • C:\WINDOWS\PRAGMArnyycvnixg\PRAGMAd.sys
  • C:\WINDOWS\PRAGMArnyycvnixg\pragmabbr.dll
  • C:\WINDOWS\PRAGMArnyycvnixg\PRAGMAc.dll
  • C:\WINDOWS\PRAGMArnyycvnixg\PRAGMAcfg.ini
  • C:\WINDOWS\PRAGMArnyycvnixg\pragmaserf.dll
  • C:\WINDOWS\PRAGMArnyycvnixg\PRAGMAsrcr.dat
  • C:\WINDOWS\PRAGMArnyycvnixg
  • C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Data Protection
  • C:\Program Files\Data Protection

Some of the file names may be randomly generated. The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine.

Data Protection Associated Registry Values and Keys

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr=1
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\MSWINSCK.exe=C:\DOCUME~1\MALWAR~1.ORG\LOCALS~1\Temp\MSWINSCK.exe
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Data Protection=”C:\Program Files\Data Protection\datprot.exe” -noscan
  • HKEY_CURRENT_USER\Software\Paladin Antivirus
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\Settings_0=1
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\SecStatus_3=1
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\SecStatus_4=1
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\SecStatus_5=1
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\FD=0
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\GUID=622702546227019962270133
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\Data=:1884:1998:2112:2226:2340:2454:2568:2682:2796:2910:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\swver=3.0
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\dbver=1.1
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\dbsigns=62577
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\dbverf=1.1
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\dbsignsf=62577
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\InfectedFiles=C:\WINDOWS\System32\wbcache.deu,C:\WINDOWS\System32\write.exe,C:\WINDOWS\System32\Drivers\dmio.sys,C:\WINDOWS\System32\Drivers\sfloppy.sys,C:\WINDOWS\System32\Wbem\htable-sortby.xsl,C:\WINDOWS\System32\Wbem\wmipsess.mfl,C:\WINDOWS\Fonts\ariblk.ttf,C:\WINDOWS\Fonts\sseriffr.fon,C:\WINDOWS\Help\comexp.hlp,C:\WINDOWS\Help\lpeconcepts.chm,
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\LastScan=1273464102
  • HKEY_LOCAL_MACHINE\SOFTWARE\Data Protection\Infected=14
  • HKEY_LOCAL_MACHINE\SOFTWARE\Malware Defense
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\DisableTaskMgr=1
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\NextInstance=1
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000\Service=PRAGMArnyycvnixg
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000\Legacy=1
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000\ConfigFlags=0
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000\Class=LegacyDriver
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000\ClassGUID={8ECC055D-047F-11D1-A537-0000F8753ED1}
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000\DeviceDesc=PRAGMArnyycvnixg
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000\Capabilities=0
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000\Control
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMARNYYCVNIXG\0000\Control\ActiveService=PRAGMArnyycvnixg

The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine.

Data Protection Associated Domains

This scareware was observed accessing the following domains during installation and operation:

  • finderdow .org
  • findersta .org
  • netoffshorego .com

Note: Visiting the domains mentioned above may harm your computer system.

If you are unable to get rid of this scareware, please visit one of the recommended forums for malware help and post about your problem.

Data Protection Scareware — Screenshots

Data Protection Scareware — Video

Note: The Data Protection installation and removal was tested on a default installation of Windows XP SP3. The content provided in this article is not warranted or guaranteed by Malware Help. Org. The content provided is intended for entertainment and/or educational purposes. I am not liable for any negative consequences that may result from implementing any information covered in this article. The above information is correct at the time of my testing, it might change with time and or under different testing conditions.

You may also like to read



{ 2 comments… read them below or add one }

J May 15, 2010 at 10:49 AM

I scanned it with the antimalware and it detected the porn shortcuts and deleted them..but it didnt get rid of data protection..but i also didnt scan my computer in safe mode…is that why its not detecting it? Do I have to be in Safe Mode?

Reply

Shanmuga May 15, 2010 at 11:03 AM

Try it this way: Boot in to Windows Safe Mode with networking, download and remove temp files with CCleaner, run mbam-setup.exe and remove whatever it finds. Reboot into normal mode and repeat.

Leave a Comment

Previous post:

Next post: