Remove “COMPUTER BLOCKED” virus (MoneyPak Scam)

If your computer is locked, and you are seeing a “COMPUTER BLOCKED” police notification,then your computer is infected with a piece of malware known as Trojan Reveton.
This threat is distributed through several means. Malicious websites, or legitimate websites that have been compromised, may drop the threat onto a compromised computer. This drive-by-download often happens surreptitiously. Another method used to propagate this type of malware is spam email containing infected attachments or links to malicious websites. The threat may also be downloaded manually by tricking the user into thinking they are installing a useful piece of software. Ransomware is also prevalent on peer-to-peer file sharing websites and is often packaged with pirated or illegally acquired software.
Once installed on your computer,the “COMPUTER BLOCKED” virus will display a bogus notification, that pretends to be from the official law enforcement agency and states that your computer has been blocked due to it being involved with the distribution of pornographic material, SPAM and copyrighted content.

The “COMPUTER BLOCKED” virus will lock you out of your computer and applications, so whenever you’ll try to log on into your Windows operating system or Safe Mode with Networking, it will display instead a lock screen asking you to pay a non-existing fine of 300$ in the form of a Ukash,MoneyPak orPaySafeCard code.
Furthermore, to make its alert seem more authentic, this virus also has the ability to access your installed webcam ,so that the bogus “COMPUTER BLOCKED” notification shows what is happening in the room.

The “COMPUTER BLOCKED” notification is used by cyber criminals alongside the name of known international law enforcement agencies like Federal Bureau of Investigation (FBI),Europol and Central Intelligence Agency (CIA), or local law enforcement agencies like: West Yorkshire Police,Metropolitan Police and The United States Department of Justice.


The message displayed by the threat can be localized depending on the user’s location, with text written in the appropriate language. Depending on the variant, the Trojan may only display a message in the language spoken by its authors, or the country that was intended as the main target of the attack.
Here is an example of how the bogus “COMPUTER BLOCKED” notification:

THE FIREWALL OF THE UNITED STATES
COMPUTER BLOCKED
This computer has been blocked to Americans by the US Government Firewall

Illegally downloaded material
(audio, videos or software)
has been located on your computer

By downloading, those were reproduced, thereby involving a criminal offence under Section 106 of Copyright Act.

The downloading of the copyrighted material via the Internet or music sharing networks is illegal and is in the accordance with Section 106 of the Copyright Act subject to a fine or imprisonment for a penalty of up to 3 years.

Furthermore, possession of illegally downloaded material is punishable under Section 184 paragraph 3 of the Criminal Code and may also lead to the confiscation of the computer, with which the files were downloaded.

To perform the payment, enter the acquired GreenDot MoneyPack code in the designated payment field and press the “OK” button.

The The Firewall Of The United States Ransom is a scam, and you should ignore any alert that this malicious software might generate.
Under no circumstance should you send any money via MoneyPak to these cyber criminals, as this could lead to identity theft,and if you have, you can request a refund from Greendot MoneyPak >> HERE << , stating that the payment was due to a scam and a computer virus.

“COMPUTER BLOCKED” – Virus Removal Instructions

STEP 1: Remove “COMPUTER BLOCKED” lock screen from your computer

“COMPUTER BLOCKED” MoneyPak Ransom has modified your Windows registry and added its malicious files to run at start-up, so whenever you’re trying to boot your computer it will launch instead its bogus notification.To remove these malicious changes, we can use any of the below methods :

Method 1: Start your computer in Safe Mode with Networking and scan for malware

Some variants of “COMPUTER BLOCKED” virus will allow the users to start the infected computer in Safe Mode with Networking without displaying the bogus lock screen. In this first method, we will try to start the computer in Safe Mode with Networking and then scan for malware to remove the malicious files.

  1. Remove all floppy disks, CDs, and DVDs from your computer, and then restart your computer.
  2. Press and hold the F8 key as your computer restarts.Please keep in mind that you need to press the F8 key before the Windows start-up logo appears.
    Note: With some computers, if you press and hold a key as the computer is booting you will get a stuck key message. If this occurs, instead of pressing and holding the “F8 key”, tap the “F8 key” continuously until you get the Advanced Boot Options screen.
  3. On the Advanced Boot Options screen, use the arrow keys to highlight Safe Mode with Networking , and then press ENTER.
    [Image: Safe Mode with Networking]
  4. If your computer has started in Safe Mode with Networking, you’ll need to perform a system scan (as seen on STEP 2) with Malwarebytes Anti-Malware and HitmanPro to remove the malicious files from your machine.

IF the “COMPUTER BLOCKED” virus didn’t allow you to start the computer in Safe Mode with Networking,you’ll need to follow Method 2  to get rid of its lock screen.


Method 2: Restore Windows to a previous state using System Restore

System Restore can return your computer system files and programs to a time when everything was working fine, so we will try to use this Windows feature to get rid of “COMPUTER BLOCKED” lock screen.

  1. Restart your computer, and then press and hold F8 during the initial startup to start your computer in safe mode with a Command prompt.
    Note: With some computers, if you press and hold a key as the computer is booting you will get a stuck key message. If this occurs, instead of pressing and holding the “F8 key”, tap the “F8 key” continuously until you get the Advanced Boot Options screen.
  2. Use the arrow keys to select the Safe mode with a Command prompt option.
    Enter Safe Mode with Command Prompt
  3. At the command prompt, type cd restore, and then press ENTER.
    Next,we will type rstrui.exe , and then press ENTER.
    Alternatively, Windows Vista, 7 and 8 users, can just type : C:\windows\system32\rstrui.exe.
    If you are using Windows XP, you will need to type C:\windows\system32\restore\rstrui.exe, and then press ENTER.
    System Restore commands
  4. The System Restore window will start and you’ll need to select a restore point previous to this infection.
    Restore points in Windows 7
  5. After System Restore has completed its task,you should be able to boot in Windows normal mode,from there you’ll need to perform a system scan (as seen on STEP 2) with Malwarebytes Anti-Malware and HitmanPro to remove the malicious files from your machine.

IF the “COMPUTER BLOCKED” virus didn’t allow you to start the computer in Safe Mode with Command Prompt you’ll need to follow Method 3, to get rid of its screen lock.


Method 3: Remove “COMPUTER BLOCKED” virus with HitmanPro Kickstart

IF you couldn’t boot into Safe Mode with Command Prompt or didn’t have a System Restore point on your machine, we can use HitmanPro Kickstart to bypass this infection and access your computer to scan it for malware.

  1. We will need to create a HitmanPro Kickstart USB flash drive,so while you are using a “clean” (non-infected) computer, download HitmanPro from the below link.
    HITMANPRO DOWNLOAD LINK (This link will open a download page in a new window from where you can download HitmanPro)
  2. Insert your USB flash drive into your computer and follow the instructions from the below video:
  3. After you have create the HitmanPro Kickstart USB flash drive, you can insert this USB drive into the infected machine and start your computer.
  4. Once the computer starts, repeatedly tap the F11 key (on some machines its F10 or F2),which should bring up the Boot Menu, from there you can select to boot from your USB.
    Next,you’ll need to perform a system scan with HitmanPro as see in the below video:
  5. After HitmanPro Kickstart has completed its task,you should be able to boot in Windows normal mode,from there you’ll need to perform a system scan (as seen on STEP 2) with Malwarebytes Anti-Malware and HitmanPro to remove the malicious files from your machine.

STEP 2: Remove “COMPUTER BLOCKED” malicious files from your computer

No matter what method you have used to get rid of “COMPUTER BLOCKED” lock screen, we will need to remove its malicious files from your computer.
Please download and run a scan with the following scan to completely remove “COMPUTER BLOCKED” virus from your computer.

Run a computer scan with Malwarebytes Anti-Malware Free

  1. You can download Malwarebytes Anti-Malware Free from the below link,then double click on it to install this program.
    MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK(This link will open a download page in a new window from where you can download Malwarebytes Anti-Malware Free)
  2. When the installation begins, keep following the prompts in order to continue with the setup process.
    DO NOT make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked,then click on the Finish button.
    [Image: Malwarebytes Anti-Malware final installation screen]
  3. On the Scanner tab,select Perform quick scan and then click on the Scan button to start scanning your computer.
    [Image: Malwarebytes Anti-Malware Quick Scan]
  4. Malwarebytes’ Anti-Malware will now start scanning your computer for “COMPUTER BLOCKED” virus as shown below.
    [Image: Malwarebytes Anti-Malware scanning for
  5. When the Malwarebytes scan will be completed,click on Show Result.
    [Image: Malwarebytes Anti-Malware scan results]
  6. You will now be presented with a screen showing you the malware infections that Malwarebytes’ Anti-Malware has detected.Please note that the infections found may be different than what is shown in the image.Make sure that everything is Checked (ticked) and click on the Remove Selected button.
    [Image:Malwarebytes removing virus]
  7. After your computer will restart in Normal mode, open Malwarebytes Anti-Malware and perform a Full System scan to verify that there are no remaining threats

Run a computer scan with HitmanPro

  1. Download HitmanPro from the below link,then double click on it to start this program.
    HITMANPRO DOWNLOAD LINK (This link will open a new web page from where you can download HitmanPro)
    IF you are experiencing problems while trying to start HitmanPro, you can use the Force Breach mode.To start HitmanPro in Force Breach mode, hold down the left CTRL-key when you start HitmanPro and all non-essential processes are terminated, including the malware process. (How to start HitmanPro in Force Breach mode – Video)
  2. HitmanPro will start and you’ll need to follow the prompts (by clicking on the Next button) to start a system scan with this program.
    HitmanPro scanner
    HitmanPro installation
  3. HitmanPro will start scanning your computer for “COMPUTER BLOCKED” malicious files as seen in the image below.
    HitmanPro scans after Your computer has been locked virus
  4. Once the scan is complete,you’ll see a screen which will display all the infected files that this utility has detected, and you’ll need to click on Next to remove these malicious files.
    HitmanPro scan results
  5. Click Activate free license to start the free 30 days trial and remove all the malicious files from your computer.
    HitmanPro 30 days activation button

If you are still experiencing problems while trying to remove “COMPUTER BLOCKED” virus from your machine, please start a new thread in our Malware Removal Assistance forum.

IT’S YOUR TURN TO HELP!

If we have managed to help you with your computer issues, then it's your duty to let other people know that this article will help them!
You can share this article on Facebook,Twitter or Google Plus by using the below buttons.

THE 411 ON ME

FC Barcelona fan, Starbucks addicted and super geek.
I am the creator and owner of MalwareTips.com
My area of expertise includes malware removal and computer forensics. I'm active in the various online anti-malware communities where I do researches for new malware threats as they are released.
I live in Bucharest (Romania), where I run my own local computer repair shop.
I repair both hardware and other operating systems related issues, however most of my business is malware related problems.

Follow me on Google Plus

You can follow me on Google Plus, and I will try to keep you informed with the latest computer infections and malware threats!

SUPPORT MALWARETIPS! (OPTIONAL)

All our malware removal guides and utilities are completely free of charge.
We do not request any kind of money in exchange for our services, however if you like to support us with our hardware maintenance costs, you can make a small donation. Any amount is appreciated, and will support our fight against malware.
  • Andrea

    Thank you thank you thank you!! This article was beyond helpful!

  • Sam

    Yeah I tried all of those steps even the usb one and it still didn’t work. Help please

    • http://malwaretips.com/ Stelian Pilici

      Hello Sam,
      Can you start your computer in Safe mode?If yes, boot your computer in Safe Mode with Command Prompt, and type msconfig in the Command prompt OR if you are using Safe Mode with Networking, in the text box, type msconfig.
      This should start the Windows System Configuration tool. Go to the Start-up tab, and search for any suspicious or unknown entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up. Next, start your computer in normal mode and perform a scan with the following tools:

      STEP 1: Run a scan with RogueKiller

      1. Please download the latest official version of RogueKiller.
        RogueKiller Download Link (This link will automatically download RogueKiller on your computer)
      2. Double click on RogueKiller.exe to start this utility and then wait for the Prescan to complete.This should take only a few seconds and then you can click the Scan button to perform a system scan.
      3. After the scan has completed, press the Delete button to remove any malicious registry keys.

      STEP 2: Run a scan with Emsisoft Emergency Kit.

      1. Please download the latest official version of Emsisoft Emergency Kit.
        EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
      2. After the download process will finish , you’ll need to unpack EmsisoftEmergencyKit.zip and then double click on EmergencyKitScanner.bat
      3. A pop-up will prompt you to update Emsisoft Emergency Kit , please click the “Yes” button.After the Update process has completed , put the mouse cursor over the “Menu” tab on the left and click-on “Scan PC“.
      4. Select “Smart scan” and click-on the below “SCAN” button.When the scan will be completed , you will be presented with a screen showing you the malware infections that Emsisoft Emergency Kit has detected.Make sure that everything is Checked (ticked) and click on the ‘Quarantine selected objects‘ button.

      If it fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
      Good Luck!