Welcome Guest (Log In | Create Account)
New Member? Join for free.

How to remove System Security (Uninstall Instructions)

By on December 24, 2008 @ 12:15 PM | Last Updated: July 7, 2009 | Read 301,463 times.
  • Print this page

System Security is a rogue anti-spyware program from the same family as Winweb Security. This program is classified as a rogue because it uses false scan results as a method of scaring you into purchasing the software. If System Security is installed, it will be set to start automatically when you login to your computer. Once running, the program will begin to scan your computer and list a variety of infections that cannot be removed unless you first purchase the program. A dangerous problem is that System Security will list legitimate and necessary programs as infections. For example, one of the files that it states is an infection is C:\Windows\System32\svchost.exe. This file is not only legitimate, but a very important file for the operation of your computer. Without that file, your computer would not operate correctly and Windows itself may not start.

Another byproduct of System Security is that when it is running you will see a variety of false security alerts. These alerts range from warnings that your computer is being attacked to being infected with a variety of fake infections such as Lsas.Blaster.Keyloger and Spyware.IEMonster. If you click on these alerts, the program will open up a web browser and go to a page asking you to purchase the software. Just like the false scan results, these alerts are only trying to scare you into buying the program. Please ignore these alerts and instead use the free removal guide below.

 

System Security screen shot
System Security screen shot
For more screen shots of this infection click on the image above.
There are a total of 5 images you can view.

 

This guide will walk you through removing the System Security program and its associated malware for free.

 

Threat Classification:

 

Advanced information:

View System Security files.
View System Security Registry Information.

 

Tools Needed for this fix:

 

Symptoms that may be in a HijackThis Log:

<b>Note: Some of the file and folder names are random:</b>

%UserProfile%HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "1632575944"

 

Guide Updates:

12/24/08 - Initial guide creation.

 


Automated Removal Instructions for System Security using Malwarebytes Anti-Malware:

 

  1. Print out these instructions as we may need to close every window that is open later in the fix.

  2. Before we can do anything we must first end the System Security process as it disables the ability to run various programs, including MalwareBytes' Anti-Malware. To do this we must first download and install a Microsoft program called Process Explorer. Normally, we would have you use the Windows Task Manager to terminate the process, but this rogue will disable this utility as well. Please download Process Explorer from the following link and save it to your desktop.

    Process Explorer Download Link

  3. Once the program has finished downloading, look for the procexp.exe file that should now be located on your desktop. Once you find it, right-click on it and select Rename. After you click on the Rename option, you will now be able to change the name of the icon. Please change the name to explorer.exe. Once the file has been renamed, double-click on it and you will be asked to agree to the license agreement. You may also see a screen with Windows asking if you are sure you want to run the program. Please do so and you should be presented with a screen similar to the one below.


    Process Explorer

  4. Scroll through the list of running programs until you see a process that has a name consisting of random numbers, such as 13279294.exe or 51231676.exe. This process is the main System Security process, which is blocking access to our programs. A further way to identify the process is that there will be a small picture of a shield System Security shield next to the process in question. When you have identified this process, select it by left-clicking on it once so it becomes highlighted. Then click on the red X button as shown in the image below.


    System Security Process

  5. When you click on the red X to kill the process, Process Explorer will ask you to confirm if you are sure you want to terminate it as shown in the image below.


    Confirm the closing of the System Security process

    At this point you should press the Yes button in order to kill the process.

  6. Download Malwarebytes Anti-Malware, or MBAM, from the following location and save it to your desktop:

    Malwarebytes Anti-Malware Download Link (Download page will open in a new window)


  7. Once downloaded, close all programs and Windows on your computer, including this one.

  8. Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MBAM onto your computer.

  9. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes Anti-Malware and Launch Malwarebytes Anti-Malware checked. Then click on the Finish button. If MalwareBytes' prompts you to reboot, please do not do so.

  10. MBAM will now automatically start and you will see a message stating that you should update the program before performing a scan. As MBAM will automatically update itself after the install, you can press the OK button to close that box and you will now be at the main program as shown below.


    MalwareBytes Anti-Malware Screen

  11. On the Scanner tab, make sure the the Perform quick scan option is selected and then click on the Scan button to start scanning your computer for System Security related files.

  12. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.


    MalwareBytes Anti-Malware Scanning Screen

  13. When the scan is finished a message box will appear as shown in the image below.


    MalwareBytes Anti-Malware Scan Finished Screen

    You should click on the OK button to close the message box and continue with the SystemSecurity removal process.

  14. You will now be back at the main Scanner screen. At this point you should click on the Show Results button.

  15. A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.


    MalwareBytes Scan Results


    You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

  16. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.

  17. You can now exit the MBAM program.

Your computer should now be free of the SystemSecurity program. If your current anti-virus solution let this infection through, you may want to consider purchasing the PRO version of Malwarebytes Anti-Malware to protect against these types of threats in the future.

If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help

 


 

Associated System Security Files:

<b>Note: Some of the file and folder names are random:</b>

%UserProfile%c:\Documents and Settings\All Users\Application Data\538654387
%UserProfile%c:\Documents and Settings\All Users\Application Data\538654387\Languages
%UserProfile%c:\Documents and Settings\All Users\Application Data\538654387\1632575944.exe
%UserProfile%c:\Documents and Settings\All Users\Application Data\538654387\config.udb
%UserProfile%c:\Documents and Settings\All Users\Application Data\538654387\init.udb
%UserProfile%c:\Documents and Settings\All Users\Application Data\538654387\Languages\English.lng
%UserProfile%c:\Documents and Settings\All Users\Application Data\538654387\Languages\German.lng
%UserProfile%c:\Documents and Settings\All Users\Application Data\538654387\Languages\Spanish.lng
%UserProfile%%UserProfile%\Desktop\System Security.lnk
%UserProfile%%UserProfile%\Start Menu\Programs\System Security
%UserProfile%%UserProfile%\Start Menu\Programs\System Security\System Security.lnk

File Location Notes:

%UserProfile% refers to the current user's profile folder. By default, this is C:\Documents and Settings\<Current User> for Windows 2000/XP, C:\Users\<Current User> for Windows Vista/7/8, and c:\winnt\profiles\<Current User> for Windows NT.

 

Associated System Security Windows Registry Information:

<b>Note: The Registry value names are random:</b>

%UserProfile%HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "1632575944"

 


 

This is a self-help guide. Use at your own risk.

BleepingComputer.com can not be held responsible for problems that may occur by using this information. If you would like help with any of these fixes, you can ask for malware removal assistance in our Virus, Trojan, Spyware, and Malware Removal Logs forum.

If you have any questions about this self-help guide then please post those questions in our Am I infected? What do I do? and someone will help you.


Advertise   |   About Us   |   User Agreement   |   Privacy Policy   |   Contact Us   |   Sitemap   |   Chat   |   Tutorials   |   Uninstall List
Tech Support Forums   |   The Computer Glossary   |   RSS Feeds   |   Startups   |   The File Database   |   Virus Removal Guides   |   Downloads


© 2003-2014 All Rights Reserved Bleeping Computer LLC.
Site Changelog