The “Your Computer Has Been Locked” alert is a browser-based scam that tries to scare you into calling a remote tech support number so that scammers can sell you unnecessary services.
What Is The “Your Computer Has Been Locked” Tech Support Scam?
The “Your Computer Has Been Locked” fake alert is a scam that pretends to be from Microsoft or Apple to trick you into thinking that your computer has crashed or that a virus has been detected. It does this to try and scare you into calling one of the listed numbers to receive support.
If you call these phone numbers, scammers will ask you to install a program that gives them remote access to your computer. Using remote access, these experienced scammers rely on confidence tricks typically involving utilities built into Windows (eg. Event Viewer) to gain your trust and trick you into paying for “support” services or even steal credit card account information.
The “Your Computer Has Been Locked” tech support scam will put your browser on full-screen mode and display pop-up messages that won’t go away, essentially locking your browser. If this happens, you can use the “Task Manager” (for Windows) or “Force Quit” (for macOS) to close your browser and stop this pop-up.
- Open the “Task Manager” by pressing the Ctrl + Alt + Del keys on your keyboard and then selecting Task Manager.
- Scroll through the list until you see your web browser’s process and left-click on it once so it becomes highlighted. Once you have selected the browser’s process, click on the End Task button as shown in the image below.
- Your browser window should now be closed. The next time you open your browser, do not allow the browser to open the last opened page.
- On your keyboard, press the Command + Option + Escape keys simultaneously. This will open the “Force Quit” application window.
- In the “Force Quit”, click on Safari, Chrome, Firefox, or any other browser in which you are seeing the tech support scam page.
- Click the button that says “Force Quit“. This will forcefully end your browser, thus closing this tech support scam page. If you cannot switch from the unresponsive app, press Command + Option + Shift + Esc for three seconds to force it to quit. This key combination tells macOS to force quit the front-most app. Alternatively, if you are using Safari or any other browser, you can disconnect your Internet, then open the web browser, navigate from the malicious web page, then reconnect to the Internet.
When the “Your Computer Has Been Locked” page is displayed in your browser, it will show an alert message that reads:
System Warning
Your Computer Has Been Locked
Note: Your current version of Windows security infected with Viruses and other malicious applications. Viruses must be removed in:
Important: Please click UPDATE button to install the latest version and protect your data.
The above alert is not real and its purpose is to scare you into allowing the scammer remote access to your computer. If your browser has been redirected to the “Your Computer Has Been Locked” tech support scam, we recommend closing the page and do not call the listed phone number.
Why Am I Seeing The “Your Computer Has Been Locked” Tech Support Scam?
You are seeing the “Your Computer Has Been Locked” tech support scam because your device is infected with malware, malicious push notifications, or a site you have visited has redirected your browser.
Less than reputable sites can display malicious ads that redirect your browser to the “Your Computer Has Been Locked” tech support scam to generate advertising revenue. If this happens, you can close the page and install an ad blocker like AdGuard to block malicious ads. However, if you are continuously seeing pop-ups like the “Your Computer Has Been Locked” tech support scam, then your computer might be infected with a malicious program and you need to scan your device for adware and remove it.
Here are a few typical signs that you have a malicious program installed on your computer:
- Advertisements appear in places they shouldn’t be.
- Your web browser’s homepage has mysteriously changed without your permission.
- Web pages that you typically visit are not displaying properly.
- Website links redirect to sites different from what you expected.
- Browser popups appear which recommend fake updates or other software.
- Other unwanted programs might get installed without your knowledge.
For the most part, if you see a browser-based tech support scam, then you can simply close the browser and start it again. On the other hand, if you are continuously seeing scams like the “Your Computer Has Been Locked” tech support scam scam, then you should scan your computer for adware and remove anything that is found.
Removal Instructions for “Your Computer Has Been Locked” Scam
Please perform all the steps in the correct order. If you have any questions or doubts at any point, stop and ask for our assistance.
- Remove “Your Computer Has Been Locked” from Windows
- Remove “Your Computer Has Been Locked” from Mac
- Remove “Your Computer Has Been Locked” from Android
Remove “Your Computer Has Been Locked” from Windows
- STEP 1: Uninstall malicious programs from Windows
- STEP 2: Reset browsers back to default settings
- STEP 3: Use Malwarebytes Anti-Malware to remove malware and unwanted programs
- STEP 4: Use HitmanPro to scan your computer for badware
- STEP 5: Use AdwCleaner to remove adware and malicious browser policies
STEP 1: Uninstall malicious programs from Windows
In this first step, we will manually check if any unknown or malicious programs are installed on the computer. Sometimes adware and browser hijackers can have a usable Uninstall entry that can be used to remove them.
-
Press the Windows key + I on your keyboard to open the Settings app.
First, open Windows Settings by pressing Windows+I on your keyboard. You can also right-click your Start button and select “Settings” from the list.
-
In the Settings app, click on “Apps” and then “Apps & features”.
When Settings opens, click “Apps” in the sidebar, then select “Apps & Features”.
-
Find the malicious program in the list of installed apps and uninstall it.
In Apps & Features settings, scroll down to the app list and search for unknown or suspicious programs. To make things easier, you can sort all installed programs by their installation date. To do this, click “Sort by” and select “Install date”.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. When you find a malicious program, click the three dots button beside it and select “Uninstall” in the menu that appears.If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide. -
Follow the prompts to uninstall the program.
In the next message box, confirm the uninstall process by clicking on Uninstall, then follow the prompts to uninstall the malicious program.
Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read them closely.
-
Press the Windows key + I on your keyboard to open the Settings app.
Press the Windows key + I on your keyboard to open the Settings app. You can also ope the Settings app by clicking the Start button on the taskbar, then select “Settings” (gear icon).
-
In the Settings app, click on “Apps”.
When the “Windows Settings” window opens, click on “Apps“. By default, it should open “Apps and Features” but if it doesn’t, select it from the list on the left.
-
Find the malicious program in the list of installed apps and uninstall it.
In Apps & Features settings, scroll down to the app list and search for unknown or suspicious programs. To make things easier, you can sort all installed programs by their installation date. To do this, click “Sort by” and select “Install date”.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. When you find a malicious program, click on it and select “Uninstall” in the menu that appears.If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide. -
Follow the prompts to uninstall the program.
In the next message box, confirm the uninstall process by clicking on Uninstall, then follow the prompts to uninstall the malicious program.
Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
-
Go to “Program and Features”.
Right-click on the Start button in the taskbar, then select “Programs and Features”. This will take you directly to your list of installed programs.
-
Search for malicious program and uninstall it.
The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find any unknown or suspicious program, then click to highlight it, then click the “Uninstall” button.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.
If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide. -
Follow the on-screen prompts to uninstall malicious program.
In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall malicious program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
-
Open the “Control Panel”.
Click on the “Start” button, then click on “Control Panel“.
-
Click on “Uninstall a Program”.
When the “Control Panel” appears, click on “Uninstall a Program” from the Programs category.
-
Search for malicious programs and uninstall them.
The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find any suspicious or unknown program, then click to highlight it, then click the “Uninstall” button.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide. -
Follow the on-screen prompts to uninstall malicious program.
In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall malicious program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
Now that the malicious programs have been removed from your computer, we can proceed with the next step in this guide.
STEP 2: Reset browsers back to default settings
In this step, we will remove spam notifications, malicious extensions, and change to default any settings that might have been changed by malware.
Please note that this method will remove all extensions, toolbars, and other customizations but will leave your bookmarks and favorites intact. For each browser that you have installed on your computer, please click on the browsers tab below and follow the displayed steps to reset that browser.
Reset Chrome for Windows to default settings
We will now reset your Chrome browser settings to their original defaults. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.
-
Click the three dots in the top-right corner and then click on “Settings”.
Open Chrome and click on the menu button (represented by three vertical dots) in the top right corner of the window. In the dropdown menu that opens, click “Settings“. -
Click “Advanced”.
Chrome’s “Settings” should now be displayed in a new tab or window, depending on your configuration. In the left sidebar, click on the “Advanced” link. -
Click “Reset and clean up”.
In the left sidebar, under the “Advanced” section, click on “Reset and clean up“. -
Click “Reset settings to their original defaults”.
In the main window, the “Reset and clean up” section is visible, as shown in the screenshot below. Click on “Reset settings to their original defaults“. -
Click “Reset settings”.
A confirmation dialog will now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset settings” button. -
(Optional) Reset Chrome Data Sync.
In case a malicious extension reinstalls itself even after performing a browser reset, you have an additional option to reset the data sync for your browser. To do this, navigate to chrome.google.com/sync and click on the Clear Data button.
Reset Firefox for Windows to default settings
We will now reset your Firefox browser settings to their default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.
-
Click the three horizontal lines in the top-right corner and then click on “Help”.
Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
-
Click “More troubleshooting information”.
From the Help menu, click on “More troubleshooting information“.
-
Click on “Refresh Firefox”
When the “Troubleshooting Information” page opens, click on the “Refresh Firefox” button.
-
Confirm that you want to reset your browser settings.
To finish the reset process, click on the “Refresh Firefox” button in the new confirmation window that opens.
-
Click “Finish”.
Firefox will now close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on “Finish“.
Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.
Reset Microsoft Edge to default settings
We will now reset your Microsoft Edge browser settings to their default. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.
-
Click the three dots in the top-right corner and then click on “Settings”.
In the top right corner, click on Microsoft Edge’s main menu button, represented by three horizontal dots. When the drop-down menu appears, click on “Settings“.
-
Click on “Reset Settings”.
On the left side of the window, click on “Reset Settings“.
-
Click on “Restore settings to their default values”.
In the main window, click on “Restore settings to their default values“.
-
Click “Reset”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset” button.
Microsoft Edge will now erase all your personal data, browsing history, and disable all installed extensions. Your bookmarks, though, will remain intact and still be accessible.
Reset Internet Explorer to default settings
We will now reset your Internet Explorer browser settings to their default. You can reset Internet Explorer settings to return them to the state they were in when Internet Explorer was first installed on your computer.
-
Go to “Internet Options”.
Open Internet Explorer, click on the gear icon in the upper-right part of your browser, then select “Internet Options“.
-
Select the “Advanced” tab, then click “Reset”
In the “Internet Options” dialog box, select the “Advanced” tab, then click on the “Reset” button.
-
Click on “Reset”.
In the “Reset Internet Explorer settings” section, select the “Delete personal settings” checkbox, then click on the “Reset” button.
-
Click on “Close”.
When Internet Explorer has completed its task, click on the “Close” button in the confirmation dialogue box.
Close your browser and then you can open Internet Explorer again.
STEP 3: Use Malwarebytes Anti-Malware to remove malware and unwanted programs
In this third step, we will install Malwarebytes to scan and remove any infections, adware, or potentially unwanted programs that may be present on your computer.
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes)-
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
-
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
-
Malwarebytes will now begin the installation process on your device.
-
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
-
On the final screen, simply click on the Open Malwarebytes option to start the program.
-
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
-
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
-
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
STEP 4: Use HitmanPro to scan your computer for badware
In this next step, we will scan the computer with HitmanPro to ensure that no other malicious programs are installed on your device.
HitmanPro is a second-opinion scanner that takes a unique cloud-based approach to malware scanning. HitmanPro scans the behavior of active files and also files in locations where malware normally resides for suspicious activity. If it finds a suspicious file that’s not already known, HitmanPro sends it to its clouds to be scanned by two of the best antivirus engines today, which are Bitdefender and Kaspersky.
Although HitmanPro is shareware and costs $24.95 for 1 year on 1 PC, there is no limit on scanning. The limitation only kicks in when there is a need to remove or quarantine detected malware by HitmanPro on your system and by then, you can activate the one-time 30-days trial to enable the cleanup.
-
Download HitmanPro.
You can download HitmanPro by clicking the link below.
HITMANPRO DOWNLOAD LINK
(The above link will open a new web page from where you can download HitmanPro) -
Install HitmanPro.
When HitmanPro has finished downloading, double-click on “hitmanpro.exe” (for 32-bit versions of Windows) or “hitmanpro_x64.exe” (for 64-bit versions of Windows) to install this program on your computer. In most cases, downloaded files are saved to the Downloads folder.
You may be presented with a User Account Control pop-up asking if you want to allow HitmanPro to make changes to your device. If this happens, you should click “Yes” to continue with the installation.
-
Follow the on-screen prompts.
When HitmanPro starts you will be presented with the start screen as shown below. Click on the “Next” button to perform a system scan.
-
Wait for the HitmanPro scan to complete.
HitmanPro will now begin to scan your computer for malicious programs.
-
Click on “Next”.
When HitmanPro has finished the scan, it will display a list of all the malware that it has found. Click on the “Next” button to have HitmanPro remove the detected items.
-
Click on “Activate free license”.
HitmanPro may now require to activate the free 30-days trial to remove the malicious files. To do this, click on the “Activate free license” button to begin the free 30 days trial and remove all the malicious files from your computer.
When the malware removal process is complete, it will display a screen that shows the status of the various programs that were removed. At this screen, you should click on the Next button and then if prompted you should click on the Reboot button. If HitmanPro does not prompt you to reboot, please just click on the Close button.
STEP 5: Use AdwCleaner to remove adware and malicious browser policies
In this final step, we will use AdwCleaner to remove the malicious browser policies that were set by browser hijackers on your computer and delete malicious browser extensions.
AdwCleaner is a free popular on-demand scanner that can detect and remove malware that even the most well-known anti-virus and anti-malware applications fail to find. This on-demand scanner includes a lot of tools that can be used to fix the side effects of adware. browser hijackers and other malware.
-
Download AdwCleaner.
You can download AdwCleaner by clicking the link below.
ADWCLEANER DOWNLOAD LINK
(The above link will open a new web page from where you can download AdwCleaner) -
Double-click on the setup file.
Double-click on the file named “adwcleaner_x.x.x.exe” to start AdwCleaner. In most cases, downloaded files are saved to the Downloads folder.
AdwCleaner program will now open and you will be presented with the program’s license agreement. After you read it, click on the I agree button if you wish to continue. If Windows prompts you as to whether or not you wish to run AdwCleaner, please allow it to run.
-
Enable “Reset Chrome policies” to remove malicious browser policies.
When AdwCleaner starts, on the left side of the window, click on “Settings” and then enable “Reset Chrome policies“.
-
Click on the “Scan” button.
On the left side of the AdwCleaner window, click on “Dashboard” and then click “Scan” to perform a computer scan.
-
Wait for the AdwCleaner scan to finish.
AdwCleaner will now scan your computer for malware. This process can take a few minutes.
-
Click on “Quarantine” to remove malware.
When the AdwCleaner scan is completed it will display all of the items it has found. Click on the “Quarantine” button to remove the malicious programs from your computer.
-
Click on “Continue” to remove the malicious programs.
AdwCleaner will now prompt you to save any open files or data as the program will need to close any open programs before it starts to clean. Click on the “Continue” button to finish the removal process.
AdwCleaner will now delete all detected malware from your computer. When the malware removal process is complete, you may be asked to restart your computer.
Your computer should now be free of the “Your Computer Has Been Locked” tech support scam and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
- Run a computer scan with ESET Online Scanner
- Ask for help in our Windows Malware Removal Help & Support forum.
Remove “Your Computer Has Been Locked” from Mac
- STEP 1: Remove malicious profiles
- STEP 2: Delete malicious apps
- STEP 3: Reset browsers back to default settings
- STEP 4: Run a scan with Malwarebytes for Mac to remove malware
STEP 1: Remove malicious profiles
Profiles are used by IT admins in businesses to control the behavior of their Macs. These profiles can configure a Mac to do many different things, some of which are not otherwise possible.
When it comes to home users, adware and browser hijackers are using the configuration profile to prevent users from removing malicious programs from the computer. This also prevents the user from changing that behavior in the browser’s settings.
In this first step, we will check your computer to see if any configuration profiles are installed. To do this, follow the below steps:
-
Open “System Preferences”
From the Apple menu, select System Preferences.
-
Search for “Profiles”
When the System Preferences window opens, search for the Profiles icon.
If there isn’t a Profiles icon, you don’t have any profiles installed, which is normal and you can continue with the next steps. -
Remove the malicious profiles
If there’s a Profile icon, click on it and select any suspicious profile that you want to remove, and then press the – (minus) button. Click Remove to remove the profile.
STEP 2: Delete malicious apps
In this second step, we will try to identify and remove any malicious apps and files that might be installed on your computer. Sometimes redirects or adware programs can have usable Uninstall entries that can be used to remove these programs.
-
Quit the malicious programs
On the Apple menu bar, in the top-right corner, if you see any unknown or suspicious icon, click on it and then select Quit.
-
Open “Finder”
Click the Finder application on your dock.
-
Click on “Applications”
In the Finder left pane, click on “Applications“.
-
Find and remove the malicious app.
The “Applications” screen will be displayed with a list of all the apps installed on your device. Scroll through the list until you find the malicious app, right-click it, and then click “Move to Trash”.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. Here are some known malicious programs: SearchMine, TakeFresh, TopResults, FeedBack, ApplicationEvents, GeneralOpen, PowerLog, MessengerNow, ImagePrime, GeneralNetSearch, Reading Cursors, GlobalTechSearch, PDFOnline-express, See Scenic Elf, MatchKnowledge, Easy Speedtest, or WebDiscover.
-
Click “Empty Trash”
On the dock, right-click on the trash icon and select “Empty Trash”. Doing so deletes the Trash’s contents, including the program that you just sent to the Trash.
Find and remove the malicious files
- Click the desktop to make sure you’re in the Finder, choose “Go” then click on “Go to Folder“.
- Type or copy/paste each of the below paths into the window that opens, then click Go.
- /Library/LaunchAgents
- ~/Library/LaunchAgents
- /Library/Application Support
- /Library/LaunchDaemons
- Look out for any suspicious files that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. These are some known malicious files: “com.adobe.fpsaud.plist” “installmac.AppRemoval.plist”, “myppes.download.plist”, “mykotlerino.ltvbit.plist”, or “com.myppes.net-preferences.plist”. When you find a malicious file move it to the Trash.
STEP 3: Reset browsers back to default settings
In this third step, we will remove spam push notifications and malicious extensions, and change to default any settings that might have been changed by malware.
For each browser that you have installed on your computer, please click on the tab below and follow the displayed steps to reset that browser.
Remove malicious extensions and settings from Safari
To remove malware from Safari we will check if there are any malicious extensions installed on your browser and what settings have been changed by this malicious program.
-
Go to Safari’s “Preferences”.
On the menu bar, click the “Safari” menu and select “Preferences”.
-
Check Homepage.
This will open a new window with your Safari preferences, opened to the “General” tab. Some browser hijackers may change your default homepage, so in the Homepage field make sure it’s a web page you want to use as your start-up page.
-
Click “Extensions”
Next, click on the “Extensions” tab.
-
Find and uninstall malicious extensions.
The “Extensions” screen will be displayed with a list of all the extensions installed on Safari. Look out for any suspicious browser extension that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine extension. By default, there are no extensions installed on Safari so it’s safe to remove an extension
-
Remove spam notifications ads
Click Preferences, click Websites, then click Notifications. Deselect “Allow websites to ask for permission to send push notifications”.
-
Remove all data stored by websites on your computer.
In the Safari menu, choose “Preferences…”, select “Privacy” at the top of the new window that appears, and then click the “Manage Website Data” button.
In the next dialog box, click “Remove All“. It will ask you if you are sure you want to remove all data stored by websites on your computer. Select “Remove Now” to clear data that could be used to track your browsing.
-
Empty Safari Caches.
From your Safari menu bar, click Safari and select Preferences, then select the Advanced tab. Enable the checkbox to “Show Develop menu in menu bar“.
From the menu bar select Develop, then click on Empty Caches as seen in the image below.
Remove malware from Chrome for Mac
To remove malware from Chrome for Mac we will reset the browser settings to their default. Doing these steps will erase all configuration information from Chrome such as your home page, tab settings, saved form information, browsing history, and cookies. This process will also disable any installed extensions. All of your bookmarks, though, will be preserved.
-
Click on the three dots at the top right and go to Settings.
Click on Chrome’s main menu button, represented by three dots at the top right corner. Now click on the menu option labeled Settings as shown by the arrow in the picture below, which will open the basic settings screen. -
In the left sidebar, click on the “Reset and Cleanup” option.
In the left sidebar, click on “Reset and clean up“. -
Click “Reset settings to their original defaults”.
Now click on the “Reset settings to their original defaults”. link as shown in the image below. -
Click “Reset Settings” button.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset Settings” button. -
(Optional) Reset Chrome Data Sync.
In case a malicious extension reinstalls itself even after performing a browser reset, you have an additional option to reset the data sync for your browser. To do this, navigate to chrome.google.com/sync and click on the Clear Data button.
Remove malware from Firefox for Mac
To remove malware from Firefox for Mac we will reset the browser settings to its default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.
-
Go to the “Help” menu.
Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
-
Click “Troubleshooting Information”.
Next click on the “Troubleshooting Information” option as indicated by the arrow in the image below. This will bring you to a Troubleshooting page.
-
Click on “Refresh Firefox”
Click the “Refresh Firefox” button in the upper-right corner of the “Troubleshooting Information” page.
-
Confirm.
To continue, click on the “Refresh Firefox” button in the new confirmation window that opens.
-
Click on “Finish”.
Firefox will close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on the “Finish“.
STEP 4: Run a scan with Malwarebytes for Mac to remove malware
In this final step, we will scan the computer with Malwarebytes for Mac to find and remove any malicious programs that might be installed on your Mac.
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
-
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
MALWAREBYTES FOR MAC DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Mac) -
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
-
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
-
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
-
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
-
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of the “Your Computer Has Been Locked” tech support scam and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Remove “Your Computer Has Been Locked” from Android
- STEP 1: Uninstall malicious apps
- STEP 2: Reset browsers back to default settings
- STEP 3: Use Malwarebytes for Android to remove malicious apps
STEP 1: Uninstall malicious apps
In this first step, we will check if any malicious apps are installed on your phone. Sometimes browser hijackers or adware apps can have usable Uninstall entries that can be used to remove these apps.
-
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
-
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
-
Find the malicious app.
The “Apps” screen will be displayed with a list of all the applications that are installed on your phone. Scroll through the list and look out for any suspicious app that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.
Most often, cyber criminals hide malware inside video or photo editing apps, weather apps, and camera apps. -
Uninstall the malicious app
When you find a suspicious or malicious app, tap on it to uninstall it. This won’t start the app but will open up the app details screen. If the app is currently running press the “Force stop” button, then tap on “Uninstall”.
A confirmation dialog should be displayed to confirm you want to uninstall the app, tap on “OK” to remove the malicious app from your phone.
STEP 2: Reset browsers back to default settings
In this second step, we will reset your browser to its default settings to remove spam notifications, unwated search redirects, and restore its factory settings
Resetting the browser settings to their default it’s an easy task on Windows or Mac computers; however, when it comes to Android, this can’t be done directly because it’s not an option built-in into the browser settings. Restoring the browser settings on Android can be done by clearing the application data. This will remove all the cookies, cache, and other site settings that may have been saved. So let’s see how we can restore your browser to its factory settings.
Remove malware from Chrome for Android
To reset Chrome for Android to its default settings, follow the below steps:
-
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
-
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
-
Find and tap on Chrome.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Chrome app, then tap on it to open the app’s details.
-
Tap “Storage”.
When Chrome’s app info menu is displayed, tap on “Storage“.
-
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
-
Tap “Clear all data”.
Tap “Clear all data” to delete all Chrome’s data including accounts, bookmarks, and your settings to reset the default settings.
-
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
Remove malware from Firefox for Android
To reset Firefox for Android to its default settings, follow the below steps:
-
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
-
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
-
Find and tap on Firefox.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Firefox app, then tap on it to open the app’s details.
-
Tap “Storage”.
When Firefox’s app info menu is displayed, tap on “Storage“.
-
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
-
Tap “Clear all data”.
Tap “Clear all data” to delete all Firefox data including accounts, bookmarks, and your settings to reset the default settings.
-
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
Remove malware from the Opera browser
To reset the Opera browser to its default settings, follow the below steps:
-
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
-
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
-
Find and tap on Opera.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Opera app, then tap on it to open the app’s details.
-
Tap “Storage”.
When Opera’s app info menu is displayed, tap on “Storage“.
-
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
-
Tap “Clear all data”.
Tap “Clear all data” to delete all Opera’s data including accounts, bookmarks, and your settings to reset the default settings.
-
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
Remove malware from Samsung Internet Browser
To reset the Samsung Internet Browser to its default settings, follow the below steps:
-
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
-
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
-
Find and tap on Samsung Internet Browser.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Samsung Internet Browser app, then tap on it to open the app’s details.
-
Tap “Storage”.
When the Samsung Internet Browser’s app info menu is displayed, tap on “Storage“.
-
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
-
Tap “Clear all data”.
Tap “Clear all data” to delete all Samsung Internet Browser’s data including accounts, bookmarks, and your settings to reset the default settings.
-
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
Remove malware from Microsoft Edge for Android
To reset the Microsoft Edge for Android to its default settings, follow the below steps:
-
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
-
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
-
Find and tap on Microsoft Edge.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Microsoft Edge app, then tap on it to open the app’s details.
-
Tap “Storage”.
When the Microsoft Edge’s app info menu is displayed, tap on “Storage“.
-
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
-
Tap “Clear all data”.
Tap “Clear all data” to delete all Microsoft Edge’s data including accounts, bookmarks, and your settings to reset the default settings.
-
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
STEP 3: Use Malwarebytes for Android to remove malicious apps
In this final step, we will install Malwarebytes for Android to scan and remove malicious apps from your phone or tablet.
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
-
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
MALWAREBYTES FOR ANDROID DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Android) -
Install Malwarebytes for Android on your phone.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
-
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
Tap on “Got it” to proceed to the next step.
Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
Tap on “Allow” to permit Malwarebytes to access the files on your phone. -
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
-
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of the “Your Computer Has Been Locked” tech support scam and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
- Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
- Ask for help in our Mobile Malware Removal Help & Support forum.
your driections and suggestions are soper duper!!!! it took the image disk to get back some of desktop control……i got internet back!!!! i recomment to anyone to feel save working with Stelial…………thank you Stelial
Oook! I just want to thank you so so much, what a nightmare, I fully thought I was going to wake up to police arresting me some time soon for pedofilia. That would so much awkward explaining with all the lezo porn on my computer. (I’m a 26 yr old chick that’s still in the closet!) My deepest appreciation. You guys rock!! ;) :)
Stelian,
My deepest thanks to you! Your methodical, step-by-step guide was easy to follow and banished the malware. All best to you!
Hi. Computer locked this morning and all icons gone from home screen. Hit an pro did the trick. Thanks.
Hello,
Stay safe Tom! I don’t want to see you around again, so don’t let your machine get infected again! :P
Hello,
Please create a HitmanPro Kickstart USB as seen here: http://malwaretips.com/blogs/remove-police-trojan/#hitmanpro
OR
Please create a bootable Kaspersky Rescue Disk as seen here: http://malwaretips.com/blogs/remove-police-trojan/#kaspersky
Stay safe!
Hello,
Your Windows Hosts file is infected. Please run this fix file: http://go.microsoft.com/?linkid=9668866
Then run a scam with Malwarebytes and HitmanPro:
the virus is away. I can’t go to google. There stands you shall not pass. Can you help me please!!!!
Ty so much man u just save me was so worried ya
Thank you so much, I was so worried when I got this. I was going to pay the money. it works. is there anything anyone can do ti stop these theives. xx
THANKKK YOUUU SOOO MUCCCH! I was so scared when it first popped up onto my screen, I was actually going to pay the money!
You are a hero!
Hello Liz,
If there is no internet connection, you can try scanning in EWS mode (goto Settings -> Advanced -> Early Warning Scoring and check “I am an Expert”).
If it still doesn’t work,you’ll need to create a Kaspersky Rescue CD as seen HERE: http://malwaretips.com/blogs/anonymous-virus/ , on Method 2.
If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
Good Luck!
Ok, I ran a second time and am now back in! But, I have no Internet connection.
I ran the scan with HitmanPro, but it found nothing!? Wat do I do now??
Method 1 worked for me on the first try and the ‘police lock screen’ is gone. Right now I’m throwing everything I’ve got at my system, Hitman Pro, MBAM, Norton Anit-Virus. I feel like I just gave birth to a baby from my head. All should be well now. I need to go to bed for 24hrs. Thank you for honest and precise information and straight-forward help, Stelian. I have a raging headache but things could’ve been far worse. I’ve ffed you on google+. Bless you man!
Great job, i was scared to death when this happened. Thank you
Many thanks system restore did the trick
Thank you very much you helped me to restore my laptop Many thanks
I love you man. Was visiting US in business and i was downloading some stuff and installed flashplayer when this popped up. I got scared to death,acually bought moneypak 200 $ as this was on my work laptop.. but before i acually paid anything my brain started to work and i searched for this thru my phone and i found this. I have to spend 200 $ on ebay instead now.. but thatss far better. Well thanks man u saved me.
Thank you!
Wow thank you so much. You are a very intellectual person
The System Restore method worked for me too, but as others have said it takes time so be patient. Really great to have found a solution. Many thanks as it was real worry. It was obviously a scam as the police would not work like that but when you just can’t get into your own computer and are not a techhy, it’s a real worry. Mind you, how the virus got there in the first place is a mystery as I’ve got fully paid up antivirus software! Anyway, great article and thanks.
Hello Ian,
If Malwarebytes and HitmanPro scans finished without any infected objects being detected, then you have a clean computer.However if you want to make another check, you can run a scan with the below utilities:
STEP 1: Run a scan with Eset Online Scanner.
ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
STEP 2: Run a scan with Emsisoft Emergency Kit.
EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
Stay safe!
Hi Stelian, thanks heaps for your help! The system restore method worked for me to remove the lock screen, easy instructions for even someone as terrible at this stuff as I am. Only thing is, the MalwareBytes scan never found any infected files for me to delete. Does this mean the infected files are still lurking about somewhere, or am I good to go and the system restore has done the job altogether by itself? Cheers anyway mate, good on you for helping computer noobs like me sort this out!
Thank you so much for this advice. Couldn’t quite believe what I was seeing when this nasty little screen popped up. Especially as they took a photo of me too! Horrible stuff but your instructions did the trick.
Hello Oliver,
Can you start your computer in Safe mode?If yes, boot your computer in Safe Mode with Command Prompt, and type msconfig in the Command prompt OR if you are using Safe Mode with Networking, in the text box, type msconfig.
This should start the Windows System Configuration tool. Go to the Start-up tab, and search for any suspicious or unknown entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up. Next, start your computer in normal mode and perform a scan with the following tools:
STEP 1: Run a scan with RogueKiller
RogueKiller Download Link (This link will automatically download RogueKiller on your computer)
STEP 2: Run a scan with Emsisoft Emergency Kit.
EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
Hi. I’ve done everything you have said and when I turn my computer on and log in the same screen comes up! Any ideas why? Cheers
Thanks a lot, the advice worked a treat and helped me sort out my step-daughters laptop. Thanks very much.
It took a fee tries because everytime i tried doing method one or two, after the log in process it would shut my comp down. I took the batery out and tried oonce more amd method two worked like a charm!! Ty s much
Thank you, mate. Very helpful indeed.
Great site. Good job and keep up the good work.
Brill, what happens to the people who have done this!
If I ever find them for wasting my time!
Thank you!
thank you so muched. worked perfectly. started in safe mode and downloaded the file, scanned, restarted and now working. many thanks
Hello Karine,
If you can start your computer in Safe Mode, then you can either download or transfer Malwarebytes from an USB stick on the infected computer and perform a scan…
Or your second option, is to boot your computer in Safe Mode with Command Prompt, and type msconfig in the Command prompt OR if you are using Safe Mode with Networking, in the text box, type msconfig.
This should start the Windows System Configuration tool. Go to the Start-up tab, and search for any suspicious or unknonw entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up. Next boot your computer in regular mode and perform a scan with HitmanPro and Malwarebytes as seen on the guide.
Hello Ethan,
Another possible issue, might be a corrupted driver, can you please try to update or reinstall your Network driver…
Hello Bethany,
The red x Network icon in your system tray indicates a connection that is not being used. Since your PC is connecting fine to the internet and your home network, more than likely you have more than one possible network connection available for use. Are there any other network adaptors disabled – http://windows.microsoft.com/en-US/windows-vista/Troubleshoot-network-adapter-problems ?
Another possible issue, might be a corrupted driver, can you please try to update or reinstall your Network driver..
Me again! Um, like another person it says there is no network connection even though I can access the Internet! I followed your steps but when I click view network connections it’s completely blank! Help?! Thankyou
Hello Bethany,
From a malicious email attachement, a malicious download or a Java exploit, these are the most common infections points.
Free – Avast 7 Free version or COMODO Internet Security
Anyway ,you should really start a thread in our Security Configuration forum as you need to build a layered security config: http://malwaretips.com/Forum-Security-Configuration-Wizard
Also it would very good idea, if you took the time and read this article that I’ve wrote: http://malwaretips.com/blogs/how-to-easily-avoid-pc-infections/ .. If you follow it,then we’ll never meet again in this conditions:)
Thanks so much!! Fixed my computer up nicely, the first method worked a treat after a couple of attempts, do you know how these viruses get picked up? And what’s the best free antivirus program? Thankyou
I am stuck After step 1 , the safe mode network worked well, but from there i had no internet connection , o i could not download Malwarebytes but now I have no Internet connection and a system recovery is not working! What do I do? Was I suppose to download Malwarebytes after I restart or whilst the computer is still on safe mode? Help please!!
Hello Todd,
Please try one more time to boot from the HitmanPro USB,pay attention at the booting part and click F11 once your computer starts.
If it still doesn’t work,you’ll need to create a Kaspersky Rescue CD as seen HERE: http://malwaretips.com/blogs/remove-police-trojan/ , on Method 3.
If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
Good Luck!
Hi Stelian,
I cannot start Windows successfuly after inserting the HitmanPro Kickstart USB flash drive.
No option works for me currently (Safe Mode, Safe Mode with Networking, Safe Mode with Command Prompt or even Starting Windows Normally.
Appreciate your help,
Todd
Hi, thank you, but unfortunately I already tried that to no avail. It was already enabled. Any other ideas?
Hello Ethan,
You most liklely have a network adapter disabled.
Open Network Connections by clicking the Start button , and then clicking Control Panel. In the search box, type adapter, and then, under Network and Sharing Center, click View network connections.
Right-click the network adapter icon, and then click Enable. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.
Hello Bishop,
Please perform a scan with the following tools:
STEP 1: Run a scan with RogueKiller
RogueKiller Download Link (This link will automatically download RogueKiller on your computer)
STEP 2: Run a scan with Kaspersky Virus Removal Tool
Click here to download the Kaspersky Virus Removal Tool.
I did everything you said successfully and removed the Trojan from my laptop. Multiple scans prove that I am now in the clear, however, my network icon in my tray is showing that my Internet is disconnected, but my Internet works fine (although first startup to my homepage takes longer than usual.) I’ve tried many things but I came get it to stop showing the X. Little worried, is it possible I still have a partial virus?
Thank you for all your help, hope you can help me further.
Hello Jason,
If there is no internet connection, you can try scanning in EWS mode (goto Settings -> Advanced -> Early Warning Scoring and check “I am an Expert”).
If it still doesn’t work,you’ll need to create a Kaspersky Rescue CD as seen HERE: http://malwaretips.com/blogs/remove-police-trojan/ , on Method 3.
If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
Good Luck!
Hello Liam,
Once you are at the Command prompt,type in the following:
For Windows XP: C:\windows\system32\restore\rstrui.exe and press Enter
For Windows Vista/7/8 : C:\windows\system32\rstrui.exe and press Enter
If for some reason, it won’t go into the System Restore options, boot your computer in Safe Mode with Command Prompt, and type msconfig in the Command prompt. This should start the Windows System Configuration tool. Go to the Start-up tab, and search for any suspicious or unknonw entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up. Next boot your computer in regular mode and perform a scan with HitmanPro and Malwarebytes as seen on the guide.
If it still doesn’t work,you’ll need to create a Kaspersky Rescue CD as seen HERE: http://malwaretips.com/blogs/remove-police-trojan/ , on Method 3.
If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
Good Luck!
Hi, once I am going into Safe Mode with Command Prompt it starts scrolling type before I can imput ‘cd restore’. I know I have to be quick but I am doing this within seconds but doesn’t type anything on the screen.
Can you help please…?
Thanks for the help! you’re awesome!
I was able to access my menu using Safe Mode with Networking. I completed the quick scan and full scan using Malwarebytes. 90 items were removed. Then, I downloaded and ran 64bit Hitmanpro 3. After restart, i still have the locked screen. What can I do?
Great advice. I used System Restore. It took about an hour, so be patient. The hard disk light kept flickering so I stayed with it. On restarting my computer the blocking Ukash page had gone and my desktop was back! Then I followed the link to run Malwarebytes Anti-Malware. Quick scan picked up about 400 infected files which were easy to remove. Sorted! Thanks again.
Top advice, easily removed . Thanks a lot . Mark
Hey matey, just downloaded Hitman Pro Kickstart and ran throught all the points successfully until i got to the scan itself when the program said i had no internet connection (although i have a wireless connection up and running) and was ‘searching for Internet connection’ with a countdown timer of 5 minutes next to it. What can i do now now as Hitman won’t take me any further unless i have a connection (even though i do)?
Jase x
Hello,
Just follow the instructions from this guide, and you should be able to easily remove this infection…..Start with Step 1:)
Hi this happened to me on a school laptop, if I go the the IT people do you think they will be able to help me? I’m really scared and even considered ringing the police to sort it out, should I ring the police? Thanks heaps
leigh
Ok, thanks then. This was a lifesaver!
You have saved me alot of hassle and time. Your help is greatly appreciated.Thanks.
Hello,
No,the police won’t lock down your computer…so this is nothing more than a scam!
Stay safe!
Thanks! This helped, but I do have a problem though. It could be nothing, but when the message poped up, it had some of my personal info, name, acount, predetermined username, email, age, this worries me, could it be the reap thing. I mean everything it had was common items found on my computer and nothing big like adress or SS but is their a real copies of the virus that is legit? And does this mean anything? Or is it just me. Thanks
Hi
Just to thank for your clear instructions, sequence and detail which was totally effective in helping me remove and clean up my PC after being hit by the ‘ your computer has been locked’ and you may go to jail malware. A great service very professionally delivered
Ian
Dublin
thank you very much. It have been very helpfull
You r really a life saver, came home and this crap was on and almost lost my mind. Thank you so very much…… your awesome!
Thanks for the help. Really got us out of a lot of bother
Hello Pete,
The HitmanPro should not take more that 10 – 15 minutes….. Try to start another scan, and if you still have problems, you’ll need to create a Kaspersky Rescue CD as seen http://malwaretips.com/blogs/remove-ukash-virus/, on Method 3.
If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
no boot from safe mode or restore point options so I chose option 3 – created hitmanpro to flash and booted from flash drive ok however started to scan and it stopped at “classifying 97%” I left it for over 3 hours and cancelled the scan. Next I attempted a quick scan and that stopped at “classifying99% – can you clarify how long the scan should take as the above instruction video says it should only take a few minutes ………. am I being too impatient??
Thank You,Your software removed my computer problem.
Glad you people are here.
Regards
Mel
Thank you so much. Method 2 did the trick for me. Just one to note though, it buggered my Norton up so had to reinstall. Many thanks andy
______**ANOTHER SOLUTION**______
This is a solution that worked for me. I had no previous system restore date and Safe Mode with Networking was also being locked.
In Safe Mode with cmd, I found that it was explorer.exe which triggered the lock.
So I restarted in Safe Mode with cmd, and before the lock came into effect (there appeared to be a transition lag), I opened up the Task Manager and closed explorer.exe.
It worked. The lock did not show up, and now I had access to my browser and the internet via Task Manager to install Malwarebytes and rid the computer of the virus. I ran a second scan just to make sure.
(Just for the record, I actually had opened Internet Explorer before closing explorer.exe, but launching your browser with Task Manager I assume also would work)
I hope this can be of some help to others. Good luck.
Hello Bram,
Malwarebytes should have detected the malicious files, nevertheless the HitmanPro scan is free and will only take 5 – 10 minutes…Their is no good reason why you shoudn’t do it! :)
Stay safe!
Thanks a lot for the helpful solutions above (I had to use the command prompt option asc normal safe mode still gave me the blocked screen). One quick question though, after I scan with Malwarebytes (both quick and full), do you suggest I still run the HitmanPro program? Or is the Malwarebytes enough (it did find an infected file)?
Kind regards,
Bram
Hello Chuck,
This infection has disabled your USB ports,so you’ll need to create a Kaspersky Rescue CD as seen http://malwaretips.com/blogs/remove-ukash-virus/, on Method 3.
If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
Thank you – this was very helpful
I have the Police cybercrime virus on my ibm thinkpad computer. I am running windows xp I have done the hitman pro kickstart. I loaded on my desktop computer and then made a usb to load on my infected laptop. It will not recognize my usb. When booting up my usb lights up and looks like it ia available. But I have no access to it during my boot up. What am I missing? Is there something I can do?
Doing the step with command prompt worked for me. Nice job! good advice and I wish the best for you with your shop.
Thank you man you really helped me all the best
Thanks so much!! Worked perfectly!! You’re a lifesaver!
Awesome stuff,method 2 worked perfectly..thanks so much for the help
Thank you sooo Much!! It saved my life.. tried method 1 and didnt work but Method 2 worked for me.
Thank you again as a student it is such a relief i found this blog, because all my neede files are on my laptop.
Massive thank you!!
Thank you!!
im trying it right now, one question, where do i get the virus from????
Thank you, your advice has been very helpful.
Salut Marian,
Ai incercat vreuna din variantele din articolul asta?Toate sunt usoare de realizat si in functie de ce versiune de virus ai , ar trebui sa rezolve problema ta!
Sarbatorii fericite!
OMG thank God for you!
I didn noe what to do but thankfully with this advice, method 2 worked great for me!
Thank Yu :)
Worked perfectly
I got over the problem by removing the battery and unplugging the charger.
I plugged in the charger again and turned on the computer.
However, although this gets rid of the screen, it erases the history tab for today.
All other data is left, though.
Hello Matt,
It looks like you have a more aggressive variant of this virus. Can you please try to format and install back HitmanPro and givinig a try?
If it doesn’t work, you’ll need to created a Kaspersky Rescue CD as seen in this article, on Method 3.
Step 1, Method 3 + Step 2 = UKASH, down in flames. It also took care of another malware item I didn’t know about. Kudos!
omg!!! thank you sooo much <3 i followed method 1 and it fixed my laptop!
Hey Stelian
Thanks for the help, but I’m still struggling…
Methods 1 & 2 are blocked. I’ve got a Kickstart loaded on to a USB and I’m trying method 3. Problem I have is that when I select boot from the flash drive the next screen says to remove disks and hit any key to continue. It won’t continue with the USB in and if I remove it boots to the locked Ukash screen.
It’s driving me mad. What can I do??
Thanks again
Succès total et rapide avec la méthode numéro 2. Un gros merci pour avoir partager cette solution. J’imagine qu’elle doit fonctionner pour tous ces types de virus en nous permettant d’avoir accès aux points de restauration du système.
You saved my butt! I thought my computer was getting hacked into.. thanks to you i stopped them! on christmas eve at that!! the best! :)
awesome easy to do and great instructions
salut Stelian , l-am luat si eu – POLICE UKASH – ma poti ajuta , te rog ? mersi mult
Thank you so much! I was so terrified when it appeared on my computer! Thank you thank you :)
Salut Attila,
Pentru nimic si ai grija de tine!Sarbatori fericite !
Mersi frumos Stelian Pilici. Mi-a functionat metoda nr.2. Era cat pe ce sa pun botul la virusul asta ciumeg. mai salvat de o reformatare. Inca odata multumesc mult, sa ai Sarbatori Fericite si Un An Nou Fericit! (Respect efortul si munca ta.)
Thank you so much! You are a cyber god!
Thank you, thank you! When my miscreant daughter picked this up at midnight yesterday I thought that was the end of one lappie and the loss of a great deal of university work. I figured I needed to do something from safe mode but had no idea of the instructions to run Restore from a command prompt. You just saved us one unhappy Christmas.
Thank you! You really rock!
Hello Adissa,
You should’ve have used just only one of the methods , but even if you used both that’s not a problem.
If the Malwarebytes scan and HitmanPro came up clean then your computer is good to go!
Stay safe!
This website helped me a lot but I am still confused. Because when I did the cd restore…and started it on again the screen with the virus (locked computer) didnt appear. And I didnt use a usb to install the scanning tool. I just downloaded it from my actual (infected computer) and i could see any results of that virus …there where 1 or two ..but not called spyware more like GSA i think. So is my computer safe now? has it been removed or not? Thanks again.
I called the police in a panic. Once I got my head together, your website was a blessing. The first time attempted method 1, it didn’t offer a place to type in commands. I tried again and it was a success. Warning “don’t let kids use your laptop and watch freetv!”. Thanks a bunch for the help. Merry Christmas…whhohoo
Thanks a lot. Got infected by virus (Ukash). Used method 1 and I fixed the problem. Your a good man
Thanks very much.