Windows Problems Help Center

Wednesday, February 4, 2015

Remove "System At Risk! Call Customer Support Number - 1-888-702-3606" Pop-up

Description of The fake warning pop-up

The "System At Risk! Call Customer Support Number - 1-888-702-3606" Pop-up can appear on your browser after your computer is infected with adware or potentially unwanted program. After infiltrating into the computer, it will add the unwanted browser extension and add-on to your browser and change the browser setting.  When you surf the Internet, the fake warning pop-up will pop up on your browser automatically without your permission.

The fake warning pop-up is typically created by the cyber criminals to make profits by cheating the computer users about their computer security.  This webpage will display false warning message to scare the users and offer a hotline to call for help. However, this is a tricky and misleading message that should not be trusted. If you call the number, you will connect to a salesman who will sell you unwanted programs or services with a high price for fixing your problem. You should remove this fake warning pop-up infection as soon as possible. It is highly recommended to scan your computer with a powerful anti-virus like Spyhunter to check out the problem in details and remove the threat. You can refer to the guide as follow.

Instructions to get rid of the fake warning pop-up

Method 1: Manual removal

Step 1: Stop related running processes in Windows Task Manager first.

( Methods to open Task Manager: Press CTRL+ALT+DEL or CTRL+SHIFT+ESC or Press the Start button->click on the Run option->Type in taskmgr and press OK.)

Step 2: Remove any infection related program from Control Panel.

Windows Vista and Windows 7

1. Open the Start menu.
2. Click Control Panel and click Uninstall a program.
3. Remove the related programs.

Windows XP

1. Open the Start menu.
2. Click Control Panel and then click Add or Remove Programs.
3. Uninstall related programs.

Windows 8

1. Press Win+R.
2. Type in control panel and click OK.
3. Select Uninstall a program.
4. Remove the related programs.

Step 3: Remove unwanted extension or add-ons from your browsers.

Internet Explorer

1) Go to 'Tools' → 'Manage Add-ons';
2) Choose 'Search Providers' → choose 'Bing' search engine or 'Google' search engine and make it default;
3) Select 'Search Results' and click 'Remove' to remove it;
4)  Go to 'Tools' → 'Internet Options', select 'General tab' and click 'Use default' button or enter your own website, e.g. Click OK to save the changes.

Google Chrome

1) Click on 'Customize and control' Google Chrome icon, select 'Settings';
2) Choose 'Basic Options'.
3) Change Google Chrome's homepage to or any other and click the 'Manage search engines...' button;
4) Select 'Google' from the list and make it your default search engine;
5) Select 'Search Results' from the list remove it by clicking the "X" mark.

Mozilla Firefox

1) Click on the magnifier's icon and select 'Manage Search Engines....';
2) Choose 'Search Results' from the list and click 'Remove' and OK to save changes;
3) Go to 'Tools' → 'Options'. Reset the startup homepage or change it to under the 'General tab';

Step 4: Show all hidden files and clean all the malicious files.

(1).Click the Start button and choose Control Panel, clicking Appearance and Personalization, to find Folder Options then double-click on it.
(2).In the pop-up dialog box, click the View tab and uncheck Hide protected operating system files (Recommended).

Step 5: Clear all the cookies of your affected web browsers.

Since the tricky virus has the ability to use cookies for tracing and tracking the internet activity of users, it is suggested users to delete all the cookies before a complete removal.

Google Chrome:

Click on the "Tools" menu and select "Options".
Click the "Under the Bonnet" tab, locate the "Privacy" section and Click the "Clear browsing data" button.
Select "Delete cookies and other site data" and clean up all cookies from the list.

Mozilla Firefox:

Click on Tools, then Options, select Privacy
Click "Remove individual cookies"
In the Cookies panel, click on "Show Cookies"
To remove a single cookie click on the entry in the list and click on the "Remove Cookie button"
To remove all cookies click on the "Remove All Cookies button"

Internet Explorer:

Open Internet explorer window
Click the "Tools" button
Point to "safety" and then click "delete browsing history"
Tick the "cookies" box and then click “delete”

Method  2: Automatic Removal with SpyHunter

SpyHunter is a world-famous real-time malware protection and removal tool, which is designed to detect , remove and protect your PC from the latest malware attacks, such as Trojans, worms, rootkits, rogue viruses, browser hijacker, ransomware, adware, key-loggers, and so forth. To keep SpyHunter Anti-malware on your computer is an important way to protect your computer in a good condition. Please find the instruction as follow. 

Step 1: Click the following button to download SpyHunter.

Step 2: Save it into your computer and click on the Run choice to install it step by step.

Step 3: Click Finish then you can use it to scan your computer to find out potential threats by pressing Scan computer now!

Step 4: Tick Select all and then Remove to delete all threats.

Guide to download RegCure Pro to optimize PC 

If you are still worried about the left over of the fake warning pop-up and want to clean all the unwanted registry entries,  it is recommended to use RegCure Pro.

Step 1. Install and launch RegCure Pro on your PC.

Step 2.  Select "Yes" to download and install RegCure Pro.


Step 3. Click "Next" to continue.

Step 4. RegCure Pro will open automatically on your screen.

RegCure Pro

 Step 5. RegCure Pro is scanning your PC for error.

 RegCure Pro2

Step 6. After scanning, choose the issues you want to fix. 


Note:  If you don’t have sufficient expertise in dealing with the manual removal. Install Spyhunter can be your better choice, because it is capable of auto-detecting and removing viruses. You can also Download RegCure Pro to help you optimize the computer.

No comments:

Post a Comment