If your computer is locked, and you are seeing a “Your computer has been blocked” notification from Department of Homeland Security’s ICE Cyber Crime Center, then your computer is infected with a piece of malware known as Trojan Reveton.
The ICE Cyber Crime Center virus is distributed through several means. Malicious websites, or legitimate websites that have been hacked, can infect your machine through exploit kits that use vulnerabilities on your computer to install this trojan without your permission of knowledge.
Another method used to propagate this type of malware is spam email containing infected attachments or links to malicious websites. Cybercriminals spam out an email, with forged header information, tricking you into believing that it is from a shipping company like DHL or FedEx. The email tells you that they tried to deliver a package to you, but failed for some reason. Sometimes the emails claim to be notifications of a shipment you have made. Either way, you can’t resist being curious as to what the email is referring to – and open the attached file (or click on a link embedded inside the email). And with that, your computer is infected with the ICE Cyber Crime Center virus.
The threat may also be downloaded manually by tricking the user into thinking they are installing a useful piece of software, for instance a bogus update for Adobe Flash Player or another piece of software.
The ICE Cyber Crime Center virus is also prevalent on peer-to-peer file sharing websites and is often packaged with pirated or illegally acquired software.
Once installed on your computer, the ICE Cyber Crime Center virus will display a bogus notification that pretends to be from Department of Homeland Security’s ICE Cyber Crime Center, and states that your computer has been blocked due to it being involved with the distribution of pornographic material, SPAM and copyrighted content.
The ICE Cyber Crime Center virus will lock you out of your computer and applications, so whenever you’ll try to log on into your Windows operating system or Safe Mode with Networking, it will display instead a lock screen asking you to pay a non-existing fine of $300 USD in the form of a Moneypak voucher.
Furthermore, to make this alert seem more authentic, this virus also has the ability to access your installed webcam, so that the bogus ICE Cyber Crime Center notification shows what is happening in the room.
The ICE Cyber Crime Center virus locks the computer and depending on the user’s current location, displays a localized webpage that covers the entire desktop of the infected computer and demands payment for the supposed possession of illicit material.
Cyber criminals often updated the design of this lock screen, however you should always keep in mind that ICE Cyber Crime Center will never lock down your computer or monitor your online activities.
The message displayed by the threat can be localized depending on the user’s location, with text written in the appropriate language.
ICE
The ICE Cyber Crime Center
Your computer has been blocked
The work of your computer has been suspended on the grounds of unauthorized cyber activity.Possible violations are described below:
Article -174. Copyright
Imprisonment for the term of up to 2-5 years
(The use or sharing of copyrighted files). A fine from 18,000 up to 23,000 USD
Article – 183. Pornography
Imprisonment for the term of up to 2-3 years
(The use of distribution of pornographic files). A fine from 18,000 up to 25,000 USD
Article – 184. Pornography involving children (under 18 years)
Imprisonment for the term of up to 10-15 years
(The use or distribution of pornographic files). A fine from 20,000 up to 40,000 USD
Article – 104. Promoting Terrorism
Imprisonment for the term of up to 25 years without appeal
(Visiting the websites of terrorist groups). A fine from 35,000 up to 45,000 USD
Article – 68. The distribution of virus programs
Imprisonment for the term of up to 2 years
(The development or distribution of virus programs, which have caused harm to other computers). A fine from 15,000 to 28,000 USD
To unlock your computer and to avoid other legal consequences you are obligated to pay a release fee of $300 USD.
An attempt to unlock this computer by yourself will lead to the full formatting of the operating system. All the files, videos, photos, documents on your computer will be deleted.
The ICE Cyber Crime Center lock screen is a scam, and you should ignore any alerts that this malicious software might generate.
Under no circumstance should you send any Greendot Moneypak code to these cyber criminals, and if you have, you can should request a refund, stating that you are the victim of a computer virus and scam.
How to remove “ICE Cyber Crime Center” virus (Removal Guide)
This page is a comprehensive guide, which will remove the ICE Cyber Crime Center infection from your your computer. Please perform all the steps in the correct order. If you have any questions or doubt at any point STOP and ask for our assistance.
The ICE Cyber Crime Center will start automatically when you login to your computer and display its screen-locker so that you are unable to access your computer, therefore we will need to remove this infection by using any of the below methods:
OPTION 1: Remove ICE Cyber Crime Center lock screen virus with System Restore
OPTION 2: Remove ICE Cyber Crime Center virus with with HitmanPro Kickstart
OPTION 3: Remove ICE Cyber Crime Center virus with Kaspersky Rescue Disk
If you are using an Android phone, then you will need to follow our Remove Police or FBI virus from Android phone (Removal Guide).
OPTION 1: Remove ICE Cyber Crime Center lock screen virus with System Restore
System Restore helps you restore your computer’s system files to an earlier point in time. It’s a way to undo system changes to your computer without affecting your personal files, such as e‑mail, documents, or photos.
Because the ICE Cyber Crime Center virus will not allow you to start the computer in Windows regular mode, we will need to start System Restore from the Safe Mode with Command Prompt mode.
STEP 1: Restore Windows to a previous state using System Restore
- Reboot your computer into Safe Mode with Command Prompt. To do this, turn your computer off and then back on and immediately when you see anything on the screen, start tapping the F8 key on your keyboard.
If you are using Windows 8, the trick is to hold the Shift button and gently tap the F8 key repeatedly, this will sometimes boot you into the new advanced “recovery mode”, where you can choose to see advanced repair options. On the next screen, you will need to click on the Troubleshoot option, then select Advanced Options and select Windows Startup Settings. Click on the Restart button, and you should now be able to see the Advanced Boot Options screen. - Using the arrow keys on your keyboard, select Safe Mode with Command Prompt and press Enter on your keyboard.
- At the command prompt, type rstrui.exe, and then press ENTER.
Alternatively, if you are using Windows Vista, 7 and 8, you can type: C:\windows\system32\rstrui.exe , and press Enter. And if you are a Windows XP user, type C:\windows\system32\restore\rstrui.exe, then press Enter. - System Restore should start, and you will display also a list of restore points. Try using a restore point created just before the date and time the ICE Cyber Crime Center lock screen virus has infected your computer.
- When System Restore has completed its task, start your computer in Windows regular mode, and perform a scan with Malwarebytes Anti-Malware and HitmanPro, as seen in the next step.
STEP 2: Remove ICE Cyber Crime Center malicious files with Malwarebytes Anti-Malware Free
Malwarebytes Anti-Malware Free uses industry-leading technology to detect and remove all traces of malware, including worms, Trojans, rootkits, rogues, dialers, spyware, and more.
It is important to note that Malwarebytes Anti-Malware works well and should run alongside antivirus software without conflicts.
- You can download download Malwarebytes Anti-Malware from the below link.
MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a new web page from where you can download Malwarebytes Anti-Malware Free) - Once downloaded, close all programs, then double-click on the icon on your desktop named “mbam-setup-consumer-2.00.xx” to start the installation of Malwarebytes Anti-Malware.
You may be presented with a User Account Control dialog asking you if you want to run this file. If this happens, you should click “Yes” to continue with the installation. - When the installation begins, you will see the Malwarebytes Anti-Malware Setup Wizard which will guide you through the installation process.
To install Malwarebytes Anti-Malware on your machine, keep following the prompts by clicking the “Next” button.
- Once installed, Malwarebytes Anti-Malware will automatically start and you will see a message stating that you should update the program, and that a scan has never been run on your system. To start a system scan you can click on the “Fix Now” button.
Alternatively, you can click on the “Scan” tab and select “Threat Scan“, then click on the “Scan Now” button.
- Malwarebytes Anti-Malware will now check for updates, and if there are any, you will need to click on the “Update Now” button.
- Malwarebytes Anti-Malware will now start scanning your computer for the pop-up virus. When Malwarebytes Anti-Malware is scanning it will look like the image below.
- When the scan has completed, you will now be presented with a screen showing you the malware infections that Malwarebytes’ Anti-Malware has detected. To remove the malicious programs that Malwarebytes Anti-malware has found, click on the “Quarantine All” button, and then click on the “Apply Now” button.
Please note that the infections found may be different than what is shown in the image. - Malwarebytes Anti-Malware will now quarantine all the malicious files and registry keys that it has found. When removing the files, Malwarebytes Anti-Malware may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot your computer, please allow it to do so.
After your computer will restart, you should open Malwarebytes Anti-Malware and perform another “Threat Scan” scan to verify that there are no remaining threats
STEP 3: Double-check for the ICE Cyber Crime Center virus with HitmanPro
HitmanPro is a second opinion scanner, designed to rescue your computer from malware (viruses, trojans, rootkits, etc.) that have infected your computer despite all the security measures you have taken (such as anti virus software, firewalls, etc.). HitmanPro is designed to work alongside existing security programs without any conflicts. It scans the computer quickly (less than 5 minutes) and does not slow down the computer.
- You can download HitmanPro from the below link:
HITMANPRO DOWNLOAD LINK (This link will open a new web page from where you can download HitmanPro) - Double-click on the file named “HitmanPro.exe” (for 32-bit versions of Windows) or “HitmanPro_x64.exe” (for 64-bit versions of Windows). When the program starts you will be presented with the start screen as shown below.
Click on the “Next” button, to install HitmanPro on your computer.
- HitmanPro will now begin to scan your computer for any malicious files that may be on your machine.
- When it has finished it will display a list of all the malware that the program found as shown in the image below. Click on the “Next” button, to remove any virus that has been found.
- Click on the “Activate free license” button to begin the free 30 days trial, and remove all the malicious files from your computer.
OPTION 2: Remove ICE Cyber Crime Center virus with with HitmanPro Kickstart
If you cannot start your computer into Safe Mode with Command Prompt mode, we can use the HitmanPro Kickstart program to bypass ICE Cyber Crime Center lock screen.
As the ICE Cyber Crime Center ransomware infection locks you out of your computer, you will need to create a bootable USB drive that contains the HitmanPro Kickstart program.
We will then boot your computer using this bootable USB drive and use it to clean the infection so that you are able to access Windows normally again.
You will also need a USB drive, which will have all of its data erased and will then be formatted. Therefore, only use a USB drive that does not contain any important data.
- Using a “clean” (non-infected) computer, please download HitmanPro Kickstart from the below link.
HITMANPRO DOWNLOAD LINK (This link will open a download page in a new web page from where you can download HitmanPro Kickstart) - Once HitmanPro has been downloaded, please insert the USB flash drive that you would like to erase and use for the installation of HitmanPro Kickstart. Then double-click on the file named HitmanPro.exe (for 32-bit versions of Windows) or HitmanPro_x64.exe (for 64-bit versions of Windows).
To create a bootable HitmanPro USB drive, please follow the instructions from this video:
- Now, remove the HitmanPro Kickstart USB drive and insert it into the ICE Cyber Crime Center infected computer.
- Once you have inserted the HitmanPro Kickstart USB drive, turn off the infected computer and then turn it on. As soon as you power it on, look for text on the screen that tells you how to access the boot menu.
The keys that are commonly associated with enabling the boot menu are F10, F11 or F12. - Once you determine the proper key (usually the F11 key) that you need to press to access the Boot Menu, restart your computer again and start immediately tapping that key. Next, please perform a scan with HitmanPro Kickstart as shown in the video below.
- HitmanPro will now reboot your computer and Windows should start normally. Then please Malwarebytes Anti-Malware and HitmanPro, and scan your computer for any left over infections.
OPTION 3: Remove ICE Cyber Crime Center virus with Kaspersky Rescue Disk
If any of the above methods did not clean your infected computer, we can use a Kaspersky Rescue Disk Bootable to clean the Windows registry and to perform a system scan to remove the ICE Cyber Crime Center virus.
To create a bootable Kaspersky Rescue Disk, we will need the following items:
- A clean (non-infected) computer with Internet access
- A blank DVD or CD
- A computer with a DVD or CD burner
STEP 1: Download and create a bootable Kaspersky Rescue Disk CD
- You can download Kaspersky Rescue Disk utility from link below:
KASPERSKY RESCUE DISK DOWNLOAD LINK (This link will automatically download Kaspersky Rescue Disk (kav_rescue_10.iso) on your computer.) - To create the bootable rescue disk, we will need to use the ImgBurn program. You can download ImgBurn from the below link, then install this program.
IMGBURN DOWNLOAD LINK (This link will open a new page from where you can download the ImgBurn program) - Insert your blank DVD or CD in your burner, then start ImgBurn and click on the Write image file to disc button.
- Under Source click on the Browse for file button, then navigate to the location where you previously saved the Kaspersky Rescue Disk utility (kav_rescue_10.iso), then click on the Write button.
That’s it, ImgBurn will now begin writing your bootable Kaspersky Rescue Disk.
STEP 2: Start your computer using the Kaspersky Rescue Disk
- Once you’ve got the Kasperky Rescue Disk in hand, insert it into the infected computer, and turn off and then turn it on again.
- As soon as you power it on, you will see a screen that tells you to press any key to enter the menu, so please tap any key to boot your machine from the Kaspersky Rescue Disk.
- In the next screen, you will need to chose a language, then you click on Kaspersky Rescue Disk. Graphic Mode and press ENTER, to start the Kaspersky Rescue Disk.
STEP 3: Scan your system with Kaspersky Rescue Disk
- Within a few short seconds you should see the full working environment, with the Kaspersky Rescue Disk screen front and center as shown below.
- Switch tabs over to the My Update Center, and then click the Start update button to load the latest anti-virus definitions. Please be patience while this process its completed.
- Switch back over to the Objects Scan tab, select the drives you want to scan, and then click the Start Objects Scan button.
- When Kaspersky Antivirus will detect the ICE Cyber Crime Center virus, you’ll be prompted to select an action. When this happens, please select Quarantine or Delete to remove this infection from your computer.
- When the antivirus scan has completed, you can restart back into Windows regular mode, by clicking on the Kaspersky Start button (lower left corner), and selecting Restart.
Once your computer will start in Windows regular more, download Malwarebytes Anti-Malware and HitmanPro, and scan your computer for any left over infections.
Thanks a lot Mr. Stelian Pilici….You are life saver.
Hello,
Please follow this guide:http://malwaretips.com/blogs/android-police-virus-removal/
This happened on my phone what do i do?!
your a life saver
Thanks!! It worked
OMG!! You really are the best, Stelian. This is the second time I have turned to your blog for assistance and you never disappoint!! I used option #2 above to get rid of this creepy trojan and it worked like a charm!! Thank you soooooo much for your good work. You are really making a difference for a lot of laymen like me. You’re the bomb, bro……..
Thank you so much. I use option 1, but after I click safe mode with command prompt ,the system try to boost but this virus is always went back to window start page . So ,I hit Ctrl+Alt+Delete then task manager , when you back on the main page before Virus load up you have 1 min or less to do system restore ,so I did that several times before system restore kicked in . Now my PC is back to normal. Thank again for your info.
Hey guys! So I had the variant that blocked the safe mode with prompt method but accidentally found something else that worked, although not intended.
I am an avid online gamer so I have a lot of stuff that loads up upon restart (Steam, Curse, etc). It seems this virus does not “initiate” the block until everything is loaded up. When I realized that my computer was not loading up in safe mode, I went to system restore as fast as I could and initiated the system restore before everything else had loaded in.
What happened was, as soon as the computer went into restore mode it looked like the virus was trying to assert itself but the sysrestore process locked it out. The system restored successfully and I did not even have any traces of the virus left after both a Hitman and Malwarebytes scan.
I know this is not a “good” fix, but it worked without having to use alternate boot methods.
Thanks for the info though and this thing is nasty!
Thank you. Went with the HitmanPro Kickstart option & followed instructions w/100% successs. Your the MAN! Thanks.
Used option 1 and hitman pro scn oppinion worked
You Guys are the best! Used the third option. Keep up the good work
Another method, if you have another PC, is to remove the infected HD and use an adapter to connect it to an uninfected PC with virus scan ability. Run a custom scan on the suspect HD. It may, or may not, find the infection, depending on the virus scan ability to detect it.
Thank You!!!! I have been here all day trying to get rid of the ICE malware. Tried many websites for their solution but none had work until OPTION 2. It was not easy as the videos made it seemed but with patience and re-trial it has finally work!!! First, the Hitman was not functioning well so I tried another USB. It finally uploaded but the scan would not get passed 16% and it terminated it (3 times it did this). I had it to a quick scan instead and found one thing that did not seemed like a malware but when ahead and delete it. After that, my laptop started up normally without the blocked screen and so decided to do a full scan again with Hitman and this time it did finished the scan and found many malware. Deleted everything so hopefully Hitman did remove all of the malware. Thank you so much!! My files are saved!!
I tried to use the hitmanpro USB option but to scan it needs to use the internet to which I can’t access due to ice. What can I do?
Option 2 worked great THANK YOUUUU
Just finished following your instructions and poof!!!!! All normal again. You have helped so many of us we thank you!!!
The second step worked for me, and I confirmed it with HitmanPro. Thank you so much. The Ice Cyber Crime Center malicious files was bad! Appreciate your help.
The Kaspersky disc runs but does not locate the virus. Any other options, the two other suggested ones did not work either
Hello,
Are you hitting the F8 key before the Windows logo right?
Have you trie that other 2 methods which do not require “Safe Mode”?
Stay safe!
Ran malwarebytes the first time as a full scan and it found nothing. Then I ran it again as a quickscan and it found the malware. I ran Hitman as a back up and it too found the same virus. Removed from both programs and restarted. Back to normal. Thanks!
THANK YOU!!!!!! Very helpful info, option 1 & 2 didn’t work but option 3 worked and I’m back up and running. I had to do the optional fix windows “black screen” error after removing the virus but that was an easy step :) Once again, thank you!
I just wanted to say thank you! I have windows 8, and was able to use option 1 to get rid of this! It did take a lot of patience. I had a lot of issues getting into safe mode, but once I finally did it was smooth sailing. Thanks again!
Hello,
If you did reset your machine to its factory settings than the infection should be gone. Just to be on the safe side you can run the HitmanPro scan, but I highly doubt it will find something!
Stay safe!:D
Stelian, I had no restore points and had to reset to original factory settings, After that I ran MalwareBytes and it showed no trace of the virus. Is it safe to say the virus is gone, or could it have survived the reset?
Hello,
If you have the Kaspersky Rescue Disk use the WinUnlocker command to disinfect your registry.
If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal.
In the command prompt enter the command windowsunlocker and press Enter on the keyboard.
Alternatively, you could browse to the infected file, and just delete it from your machine, if you know what you are doing then this is the most fastest way to solve this issue.
Here are the usual locations for this type of infections. Depending on what operating system are you using, browse to the following paths and search for any randomly named file (eg: daxssda.exe, 1232.exe or skype.dat)
For Windows XP:
C:Documents and Settings(Current User random-file.exe
C:Documents and SettingsAll UsersApplication Datarandom-file.exe
C:Documents and Settings(Current User)Application Datarandom-file.exe
For Windows Vista, 7 and 8:
C:Users(Current User)random-file.exe
C:ProgramDatarandom-file.exe
C:Users(Current User)AppDataRoamingrandom-file.exe
C:Users(Current User)AppDataLocalrandom-file.exe
C:Documents and Settings(Current User)Local SettingsApplication Datarandom-file.exe
If you will still have issues, then you will have to create a thread in our Malware Removal Assistance forum: http://malwaretips.com/Forum-Malware-Removal-Assistance
Stay safe!
HI Stellian – Please disregard my earlier message! I retried and have finally solved the problem. Thank you very very much for your very good instructions. The world needs people like you!
Hi Stelian,
I’m so glad you are here to help! I’ve tried Option 1 without success (can’t type any command once I’ve selected Safe Mode with Commands). No success with Option 2 either (nothing happens with the USB). With Option 3, at least the Kaspersky Rescue Disk started, but after I selected Kaspersky Rescue Disk. Graphic Mode, it seemed to start, but then got stuck on a message saying “Your computer’s operating system has been shut down incorrectly. File system is going to be mounted……. you are advised to shut down the operating system correctly before using Kaspersky Rescue Disk. Do you wish to continue?” There are three options in that box: Continue, Skip, Restart Computer. My laptop seemed to respond to none of that. Nothing happened. Do you have any advice for this stage? Many thanks!
Hello,
Can you please run a scan with Combofix and post the logs here so that I can get an idea on what’s going on:
You can download ComboFix from here: http://download.bleepingcomputer.com/sUBs/ComboFix.exe
VERY IMPORTANT !!! Save as Combo-Fix.exe during the download.ComboFix must be renamed before you download to your Desktop
Close any open browsers.
Very Important!!!> Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause “unpredictable results”.
WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
1. Double click on ComboFix.exe & follow the prompts.
2. Accept the disclaimer and allow to update if it asks
3. When finished, it shall produce a log for you.
Notes:
Do not mouse-click Combofix’s window while it is running. That may cause it to stall.
Do not “re-run” Combofix. If you have a problem, reply back for further instructions.
If after the reboot you get errors about programs being marked for deletion then reboot, that will cure it.
Please post the Combofix, so that I can get an idea on what’s going on.
Next, please run a scan with HitmanPro and Malwarebytes, then let me know how is your computer running.
Hello stellian , my malwarebytes detected the “skype.dat” virus and says it will be removed upon reboot , but after reboot it again came back.
I even tried the system restore , and after that the virus didn’t show up in the malwarebytes scan results , but after 30 minutes when i re-scanned my Pc with malwarebytes , the skype.dat virus again showed up.
I even formatted my whole Pc few days ago , by deleting all partitions and did a clean install of win7 , and after that when i scanned with malwarebytes , the virus was still there .
So i wanna ask something here ,
1) does this “skype.dat” virus survives a full format ?
2) and can this particular virus transfer itself to a external hard disk drive ?
If so, then can my external HDD be scanned with hitman pro or kaspersky emergency disk. Because i don’t wanna format my external HDD since i don’t wanna lose my important data.
Thanks . waiting for you helpful replies.
Hello,
The 48 hours limit is set because they want to rush the users into paying. When it will run out, nothing will happen, the screenlocker will remain, and you still need to remove it from your machine!
Stay safe!
What Happens if time runs out?
Hello,
If you have the Kaspersky Rescue Disk use the WinUnlocker command to disinfect your registry.
If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal.
In the command prompt enter the command windowsunlocker and press Enter on the keyboard.
Alternatively, you could browse to the infected file, and just delete it from your machine, if you know what you are doing then this is the most fastest way to solve this issue.
Here are the usual locations for this type of infections. Depending on what operating system are you using, browse to the following paths and search for any randomly named file (eg: daxssda.exe, 1232.exe or skype.dat)
For Windows XP:
C:Documents and Settings(Current User random-file.exe
C:Documents and SettingsAll UsersApplication Datarandom-file.exe
C:Documents and Settings(Current User)Application Datarandom-file.exe
For Windows Vista, 7 and 8:
C:Users(Current User)random-file.exe
C:ProgramDatarandom-file.exe
C:Users(Current User)AppDataRoamingrandom-file.exe
C:Users(Current User)AppDataLocalrandom-file.exe
C:Documents and Settings(Current User)Local SettingsApplication Datarandom-file.exe
If you will still have issues, then you will have to create a thread in our Malware Removal Assistance forum: http://malwaretips.com/Forum-Malware-Removal-Assistance
Stay safe!
Hello,
While your computer in Safe Mode with Command Prompt, press the Windows key + R, then type msconfig in the Run box.
This should start the Windows System Configuration tool.
Go to the Start-up tab, and search for any suspicious or unknown entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up.
Next, start your computer in normal mode and perform a scan HitmanPro and Malwarebytes Anti-Malware as seen in this guide.
If this instructions will not work, and you are not able to use the Safe mode, then you will have to create either a Kaspersky Rescue Disk or HitmanPro USB.
Good luck! Waiting for your reply to see how everything is working!
Hello Wayne,
In some instances this virus may block you from login into Safe Mode, have you tried to create a bootable USB or CD?
Hello,
If you have the Kaspersky Rescue Disk use the WinUnlocker command to disinfect your registry.
If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal.
In the command prompt enter the command windowsunlocker and press Enter on the keyboard.
Alternatively, you could browse to the infected file, and just delete it from your machine, if you know what you are doing then this is the most fastest way to solve this issue.
Here are the usual locations for this type of infections. Depending on what operating system are you using, browse to the following paths and search for any randomly named file (eg: daxssda.exe, 1232.exe or skype.dat)
For Windows XP:
C:Documents and Settings(Current User random-file.exe
C:Documents and SettingsAll UsersApplication Datarandom-file.exe
C:Documents and Settings(Current User)Application Datarandom-file.exe
For Windows Vista, 7 and 8:
C:Users(Current User)random-file.exe
C:ProgramDatarandom-file.exe
C:Users(Current User)AppDataRoamingrandom-file.exe
C:Users(Current User)AppDataLocalrandom-file.exe
C:Documents and Settings(Current User)Local SettingsApplication Datarandom-file.exe
If you will still have issues, then you will have to create a thread in our Malware Removal Assistance forum: http://malwaretips.com/Forum-Malware-Removal-Assistance
Stay safe!
Hello,
Most likely there was an error when the CD was written, you will have to create a new CD.
Stay safe!
Hello Dyllan,
While your computer in Safe Mode with Command Prompt, press the Windows key + R, then type msconfig in the Run box.
This should start the Windows System Configuration tool.
Go to the Start-up tab, and search for any suspicious or unknown entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up.
Next, start your computer in normal mode and perform a scan HitmanPro and Malwarebytes Anti-Malware as seen in this guide.
If this instructions will not work, and you are not able to use the Safe mode, then you will have to create either a Kaspersky Rescue Disk or HitmanPro USB.
Good luck! Waiting for your reply to see how everything is working!
Hello Wayne,
Lets try to boot into Safe Mode with Networking:
1.Turn on the computer.
2.As soon as the computer starts up, press F8 several times until the Advanced Boot Menu appears. If the computer starts up into Windows, restart the computer and try again.
3.Press the Up Arrow or Down Arrow key to highlight Safe Mode with Command Prompt, then press Enter.
If you cannot use the Safe Mode with Command prompt to remove the infection, then you will have to create either a HitmanPro Kickstart USB or Kaspersky Rescue Disk as seen in this guide.
It’s not very hard to create either of these, and it should solve your problem relatively easy!
If you will still have issues, then you will have to create a thread in our Malware Removal Assistance forum – http://malwaretips.com/Forum-Help-my-PC-is-infected
Stay safe!
Sorry if my response shows up more than once but every time I close this window my latest response to you disappears. I’m using a Dell desktop, I will have to use a friends computer to make a disk or USB. What other keys can I try to get to the advanced boot screen?
Hello Wayne,
What kind of machine are you using? Have you tried other keys? Have you created the Kaspersky Rescue Disk or HitmanPro Kickstart USB?
I can’t even get the F8 part to work. using Windows 7 Professional. Trying F8 and it just skips past the Advanced Boot screen and goes right to the ICE virus screen
thanks a alot for providing the solution and helping the people in need….once again thanks alot for your assistance…
I got this virus out of the blue and used option 2 to remove it.
And it works!
Thank you, thank you so much. You’re a life saver.
Hello Victor,
If you have scanned your computer with Malwarebytes Anti-Malware and HitmanPro, then you should be safe!
Please update Java (if installed) to its latest version, and if you don’t need this program, I highly recommend that you uninstall it from your computer.
For your peace of mind, you can run also a scan with these tools:
STEP 1: Run a scan with ESET Online Scanner
1.Download ESET Online Scanner utility.
ESET Online Scanner Download Link : http://download.eset.com/special/eos/esetsmartinstaller_enu.exe
2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
3.Check Yes, I accept the Terms of Use, then click the Start button.
4.Check Scan archives and push the Start button.
5. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
6. When the scan completes, click on the Finish button.
STEP 2: Run a scan with Kaspersky Virus Removal Tool:
1. You can download from Kaspersky Virus Removal Tool from here : http://www.kaspersky.com/antivirus-removal-tool?form=1
2. Double click the setup file to run it, then follow the onscreen prompts until it is installed
Click the Options button (the ‘Gear’ icon), then make sure only the following are ticked:
System Memory
Hidden startup objects
Disk boot sectors
Local Disk (C:)
Also any other drives (Removable that you may have)
3. Then click on Actions on the left hand side
4. Click Select Action, then make sure both Disinfect and Delete if disinfection fails are ticked
5. Click on Automatic Scan, then click the Start Scanning button, to run the scan.
Stay safe!
Hello Steve,
Did you try to create a bootable Kaspersky Rescue Disk?
Can you access the Safe mode with Command Prompt mode? If yes, while your computer in Safe Mode with Command Prompt, type msconfig in the Command prompt box.
This should start the Windows System Configuration tool.
Go to the Start-up tab, and search for any suspicious or unknown entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up.
Next, start your computer in normal mode and perform a scan HitmanPro and Malwarebytes Anti-Malware as seen in this guide.
Good luck! Waiting for your reply to see how everything is working!
i just got this stupid scam trojan and option 2 worked perfectly, thanks for the solution, Stelian.
You guys are wonderful!! I was victim of this malicious virus and you pulled me right through it. I even called the 1(800) number on their website and they tried to scam me for an additional $99.99 for tech support. I never ever leave comments or reviews on anything but you really, really don’t know how happy I am right now!!!!!! Thank you, Thank you, Thank you!
Julzz
Hello,
If you have the Kaspersky Rescue Disk use the WinUnlocker command to disinfect your registry.
If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal.
In the command prompt enter the command windowsunlocker and press Enter on the keyboard.
Alternatively, you could browse to the infected file, and just delete it from your machine, if you know what you are doing then this is the most fastest way to solve this issue.
Here are the usual locations for this type of infections. Depending on what operating system are you using, browse to the following paths and search for any randomly named file (eg: daxssda.exe, 1232.exe or skype.dat)
For Windows XP:
C:Documents and Settings(Current User random-file.exe
C:Documents and SettingsAll UsersApplication Datarandom-file.exe
C:Documents and Settings(Current User)Application Datarandom-file.exe
For Windows Vista, 7 and 8:
C:Users(Current User)random-file.exe
C:ProgramDatarandom-file.exe
C:Users(Current User)AppDataRoamingrandom-file.exe
C:Users(Current User)AppDataLocalrandom-file.exe
C:Documents and Settings(Current User)Local SettingsApplication Datarandom-file.exe
If you will still have issues, then you will have to create a thread in our Malware Removal Assistance forum: http://malwaretips.com/Forum-Malware-Removal-Assistance
Stay safe!
Hello,
While your computer in Safe Mode with Command Prompt, type msconfig in the Command prompt box.
This should start the Windows System Configuration tool.
Go to the Start-up tab, and search for any suspicious or unknown entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up.
Next, start your computer in normal mode and perform a scan HitmanPro and Malwarebytes Anti-Malware as seen in this guide.
Good luck! Waiting for your reply to see how everything is working!
Wow I just got this virus I started crying I thought it was real. Anyway Option 1 is definately not working im on windows 7 and I have a spare computer, which Option is the easiest like I dont want to dowload a ton of stuff. Please I just want this thing off of my computer if you can help me I’ll don8. :p
Hello Ricky,
If you cannot use the Safe Mode with Command prompt to remove the infection, then you will have to create either a HitmanPro Kickstart USB or Kaspersky Rescue Disk as seen in this guide.
It’s not very hard to create either of these, and it should solve your problem relatively easy!
If you will still have issues, then you will have to create a thread in our Malware Removal Assistance forum – http://malwaretips.com/Forum-Help-my-PC-is-infected
Stay safe!
I got this Trojan and used option #2 since I was familiar with MalwareBytes. The Quick Scan fixed my Windows Surface Pro (Win 8.1).
Though my PC had been locked down pretty good, I did have another account that I was able to log on to and it was not affected. From this account, I downloaded MWB and ran the scan. It asked me to reboot and I again logged on to the same account and re-ran MWB. The first time, it found several infections and the second time, none.
I then switched over to the affected account and it was fine.
Thanks
Hello,
If you cannot use the Safe Mode, and you do not have another computer to create these tools, then you will have to post a thread in our Malware Removal Assistance forum, so that we may help with more advanced tools – http://malwaretips.com/Forum-Malware-Removal-Assistance
Stay safe!
Hi, I am trying to do Option 1 but after I restart my computer, repeatedly press the F8 key, then select the Safe Mode with Command prompt, my computer just seems as if it’s loading and then starts to shut down. It doesn’t give me another option to continue your steps.. I also dont have another computer to do the other option. Please help
-Ally
Hello,
While your computer in Safe Mode with Command Prompt, type msconfig in the Command prompt box.
This should start the Windows System Configuration tool.
Go to the Start-up tab, and search for any suspicious or unknown entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up.
Next, start your computer in normal mode and perform a scan HitmanPro and Malwarebytes Anti-Malware as seen in this guide.
Good luck! Waiting for your reply to see how everything is working!
Hello,
If the Kaspersky Rescue Disk cannot detect you C: drive in Graphic mode, you can use the Text mode to scan for malware. http://support.kaspersky.com/8097
Another option is to use the WinUnlocker command to disinfect your registry.
If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal.
In the command prompt enter the command windowsunlocker and press Enter on the keyboard.
Alternatively, you could browse to the infected file, and just delete it from your machine, if you know what you are doing then this is the most fastest way to solve this issue.
Here are the usual locations for this type of infections. Depending on what operating system are you using, browse to the following paths and search for any randomly named file (eg: daxssda.exe, 1232.exe or skype.dat)
For Windows XP:
C:Documents and Settings(Current User random-file.exe
C:Documents and SettingsAll UsersApplication Datarandom-file.exe
C:Documents and Settings(Current User)Application Datarandom-file.exe
For Windows Vista, 7 and 8:
C:Users(Current User)random-file.exe
C:ProgramDatarandom-file.exe
C:Users(Current User)AppDataRoamingrandom-file.exe
C:Users(Current User)AppDataLocalrandom-file.exe
C:Documents and Settings(Current User)Local SettingsApplication Datarandom-file.exe
If you will still have issues, then you will have to create a thread in our Malware Removal Assistance forum.
Stay safe!
Thanks so much. Option one worked brilliantly. Was up and running (with no loss of data) within an hour.
Hello Meggie,
Can you try to switch your USB mouse port, or use another mouse.
Also, the Kaspersky Rescue Disk has a Text mode (apart from the Graphic mode which you can use).
Another option is to use the Winunlocker command to scan and disinfect your registry.
If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal.
In the command prompt enter the command windowsunlocker and press Enter on the keyboard.
Alternatively, you could browse to the infected file, and just delete it from your machine, if you know what you are doing then this is the most fastest way to solve this issue.
Here are the usual locations for this type of infections. Depending on what operating system are you using, browse to the following paths and search for any randomly named file (eg: daxssda.exe, 1232.exe or skype.dat)
For Windows XP:
C:Documents and Settings(Current User random-file.exe
C:Documents and SettingsAll UsersApplication Datarandom-file.exe
C:Documents and Settings(Current User)Application Datarandom-file.exe
For Windows Vista, 7 and 8:
C:Users(Current User)random-file.exe
C:ProgramDatarandom-file.exe
C:Users(Current User)AppDataRoamingrandom-file.exe
C:Users(Current User)AppDataLocalrandom-file.exe
C:Documents and Settings(Current User)Local SettingsApplication Datarandom-file.exe
If you will still have issues, then you will have to create a thread in our Malware Removal Assistance forum.
Stay safe!
Hello John,
You’ve got a pretty nasty infection on this machine. It’s a ZeroAccess rootkit which has corrupted your Windows Defender settings.
To remove this infection, please follow the instructions from this guide: http://malwaretips.com/blogs/file-contained-a-virus-and-was-deleted-removal/
Stay safe!
option 2 did the job for me . thx a million
also, option 1 worked for me :-)
Option 1 worked for me! Thank you so much for posting this! I almost had a heart attack when I got this virus and you saved me lots of time, money and trips to the computer guys! I will be sharing this on my facebook as well in case anyone else runs into this issue! :) AWESOME!
Option 2 was the most successful. You saved me time and money thank very much. I going to donate now…
Thanks. The combination of the system restore and the anti-virus software has removed the ICE Crime virus /ransomware. I only wished I went with your advice first instead of trying the other tips on the internet. It would have saved me a lot of time.
So now I am doing my part and saying thanks. Hopefully this would boost the search engine quality score so other people in a similar jam can find this.
I cured the infection after 2 frustrating days hard work and research. It was the toughest virus I’ve ever had to deal with. Safe mode would not work. Restor would not work. Malawarebytes would not work. HitmanPro would function from a USB drive, but could not find the virus. I was finally able to remove the ICE Cyber Crime Center with the Kapersky Rescue disk as you instructed. Thanks so much for your excellent help and guidance. You saved the day . In gratitude, I sent you a donation by way of Paypal. -pwt57
Step two worked for me. Just follow the steps and you should be fine. My PC with the virus was a 32bit but my other PC was a 64bit so I was able to download the 64bit Hitman Pro and make it work. good luck
I had to use the Kaspersky rescue disk, and I had to stay with my computer like it was a sick child from 9am to midnight, and it finished scanning while I was asleep.
took bloody forever, but i’m just glad the [curseword] Trojan is gone.
Option 2 worked the best for me, thanks for your help!