We would like at this time to tell you about one more virus program bearing the name of Windows Emergency System. This is nothing but the fake anti-spyware application which is threatening so many computers in the world nowadays. Windows Emergency System claims of itself that it is some superb anti-spyware and system optimizing application, however, the fact is that this statement is far away from truth. This is just the next shameless forgery prepared by cyber criminals from Russia. It works using the next technique: its commences fake system scanning and then displays plenty of infections. This is why you must entirely ignore its statements and reports get rid of this junkware as soon as you can. We hope that the information provided below will be helpful to you.
In addition to such fake scans Windows Emergency System aims to show system tray notifications resulting in irritating popups. They state that your system is contaminated with serious viruses and has many imperfections requiring improvement. However, all this information is a total pack of lies. Windows Emergency System scareware blocks your Internet browser and divert you it to its rogue websites used for sale of this scam.
It is easy for anyone to come to the decision that Windows Emergency System is the program that is entirely fake and thus displays only fake alerts. In such a way its elaborators try to mislead you, and make you purchase its commercial version which is not capable at all of providing real PC protection. It is obvious that Windows Emergency System should be deleted before it initiates its hazardous activity in your system. Remember that this scam product might hinder your decent antivirus program from proper functioning and even launching. Please find the step-by-step removal guidelines on how to remove Windows Emergency System junkware below. These instructions include both automatic and manual removal recommendations telling how this scam called Windows Emergency System can be successfully deleted from your workstation.
Windows Emergency System automatic remover:
Before downloading and running GridinSoft Trojan Killer for removal of Windows Emergency System several additional preparatory steps need to be done. This is necesary, because Windows Emergency System blocks your Internet connection, and you will not be able to run GridinSoft Trojan Killer. In order to prevent this blockage please take the following sequence of steps:
1. Make sure that your Operating System is tuned up in such a mode that hidden files and folders of your PC are viewable. The instruction on how to do it can be found here for Windows XP and here for Windows Vista/7.
2. Choose “View” tab in the window that appeared, and in the advanced settings choose the option “Show hidden files and folders”. Press OK.
3. Go to the folder %User Profile%Application DataMicrosoft.
Important! Depending on the Operating System of your computer, %UserProfile% stands for C:Documents and Settings[Current User] for Windows XP and C:Users[Current User] for Windows Vista/7.
In other words, the folder that should be opened is as follows, depending on the operating system:
%SysDrive%Documents and Settings[Current User]Application DataMicrosoft for Windows XP
%SysDrive%Users[Current User]Application DataMicrosoft for Windows Vista/7.
In this folder there will be the main executable file of Windows Emergency System virus (with the icon of *avi file), having some random name.
4. Rename the above-mentioned executable file into some other name of your choice and restart your computer. Upon the system restart Windows Emergency System will no longer block your Internet browser.
5. Download the latest version of GridinSoft Trojan Killer to your infected computer, install it and run it.
The procedure for removal of Windows Emergency System is similar to removal of Windows Remedy virus as shown on the video below:
Windows Emergency System manual removal guide:
Delete Windows Emergency System files:
Delete Windows Emergency System registry entries:
HKCUSoftwareMicrosoftWindows NTCurrentVersionWinlogonShell “%AppData%Microsoft[random].exe”