Remove “Your Computer Has Been Locked” Pop-up Scam

The “Your Computer Has Been Locked” alert is a browser-based scam that tries to scare you into calling a remote tech support number so that scammers can sell you unnecessary services. 

Your computer has been Locked Virus

Your Computer Has Been Locked
Your Computer Has Been Locked Scam

What Is The “Your Computer Has Been Locked” Tech Support Scam?

The “Your Computer Has Been Locked” fake alert is a scam that pretends to be from Microsoft or Apple to trick you into thinking that your computer has crashed or that a virus has been detected. It does this to try and scare you into calling one of the listed numbers to receive support.
If you call these phone numbers, scammers will ask you to install a program that gives them remote access to your computer. Using remote access, these experienced scammers rely on confidence tricks typically involving utilities built into Windows (eg. Event Viewer) to gain your trust and trick you into paying for “support” services or even steal credit card account information.

The “Your Computer Has Been Locked” tech support scam will put your browser on full-screen mode and display pop-up messages that won’t go away, essentially locking your browser. If this happens, you can use the “Task Manager” (for Windows) or “Force Quit” (for macOS) to close your browser and stop this pop-up.

WindowsMac
  1. Open the “Task Manager” by pressing the Ctrl + Alt + Del keys on your keyboard and then selecting Task Manager.
  2. Scroll through the list until you see your web browser’s process and left-click on it once so it becomes highlighted. Once you have selected the browser’s process, click on the End Task button as shown in the image below. Step2: Close your browser process by clicking on End Task
  3. Your browser window should now be closed. The next time you open your browser, do not allow the browser to open the last opened page.
  1. On your keyboard, press the Command + Option + Escape keys simultaneously. This will open the “Force Quit” application window.
  2. In the “Force Quit”, click on Safari, Chrome, Firefox, or any other browser in which you are seeing the tech support scam page.
  3. Click the button that says “Force Quit“. This will forcefully end your browser, thus closing this tech support scam page. If you cannot switch from the unresponsive app, press Command + Option + Shift + Esc for three seconds to force it to quit. This key combination tells macOS to force quit the front-most app. Alternatively, if you are using Safari or any other browser, you can disconnect your Internet, then open the web browser, navigate from the malicious web page, then reconnect to the Internet.

When the “Your Computer Has Been Locked” page is displayed in your browser, it will show an alert message that reads:

System Warning

Your Computer Has Been Locked

Note: Your current version of Windows security infected with Viruses and other malicious applications. Viruses must be removed in:

Important: Please click UPDATE button to install the latest version and protect your data.

The above alert is not real and its purpose is to scare you into allowing the scammer remote access to your computer. If your browser has been redirected to the “Your Computer Has Been Locked” tech support scam, we recommend closing the page and do not call the listed phone number.

Why Am I Seeing The “Your Computer Has Been Locked” Tech Support Scam?

You are seeing the “Your Computer Has Been Locked” tech support scam because your device is infected with malware, malicious push notifications, or a site you have visited has redirected your browser.

Less than reputable sites can display malicious ads that redirect your browser to the “Your Computer Has Been Locked” tech support scam to generate advertising revenue. If this happens, you can close the page and install an ad blocker like AdGuard to block malicious ads. However, if you are continuously seeing pop-ups like the “Your Computer Has Been Locked” tech support scam, then your computer might be infected with a malicious program and you need to scan your device for adware and remove it.

Here are a few typical signs that you have a malicious program installed on your computer:

  • Advertisements appear in places they shouldn’t be.
  • Your web browser’s homepage has mysteriously changed without your permission.
  • Web pages that you typically visit are not displaying properly.
  • Website links redirect to sites different from what you expected.
  • Browser popups appear which recommend fake updates or other software.
  • Other unwanted programs might get installed without your knowledge.

For the most part, if you see a browser-based tech support scam, then you can simply close the browser and start it again. On the other hand, if you are continuously seeing scams like the “Your Computer Has Been Locked” tech support scam scam, then you should scan your computer for adware and remove anything that is found.

Removal Instructions for “Your Computer Has Been Locked” Scam

This malware removal guide may appear overwhelming due to the number of steps and numerous programs that are being used. We have only written it this way to provide clear, detailed, and easy-to-understand instructions that anyone can use to remove malware for free.
Please perform all the steps in the correct order. If you have any questions or doubts at any point, stop and ask for our assistance.
Browser hijackers and adware can infect Windows, Mac, or Android devices, so we’ve covered below all these operating systems. Depending on which operating system is installed on the device you’re seeing the “Your Computer Has Been Locked” tech support scam, please click on the operating system icon below and follow the displayed steps to remove it.
Removal Instructions for Windows

Remove “Your Computer Has Been Locked” from Windows

To remove “Your Computer Has Been Locked” from Windows, follow these steps:

STEP 1: Uninstall malicious programs from Windows

In this first step, we will manually check if any unknown or malicious programs are installed on the computer. Sometimes adware and browser hijackers can have a usable Uninstall entry that can be used to remove them.

Windows 11Windows 10Windows 8Windows 7
  1. Press the Windows key + I on your keyboard to open the Settings app.

    First, open Windows Settings by pressing Windows+I on your keyboard. You can also right-click your Start button and select “Settings” from the list.
    Windows 11 Open Settings

  2. In the Settings app, click on “Apps” and then “Apps & features”.

    When Settings opens, click “Apps” in the sidebar, then select “Apps & Features”.

    Windows 11 Apps and Feature

  3. Find the malicious program in the list of installed apps and uninstall it.

    In Apps & Features settings, scroll down to the app list and search for unknown or suspicious programs. To make things easier, you can sort all installed programs by their installation date. To do this, click “Sort by” and select “Install date”.
    Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. When you find a malicious program, click the three dots button beside it and select “Uninstall” in the menu that appears.

    Windows 11 Uninstall malicious program

    If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.
  4. Follow the prompts to uninstall the program.

    In the next message box, confirm the uninstall process by clicking on Uninstall, then follow the prompts to uninstall the malicious program.
    Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read them closely.

    Windows 11 Confirm Uninstall

  1. Press the Windows key + I on your keyboard to open the Settings app.

    Press the Windows key + I on your keyboard to open the Settings app. You can also ope the Settings app by clicking the Start button on the taskbar, then select “Settings” (gear icon).
    Windows 10: Click the Start button then click on Settings

  2. In the Settings app, click on “Apps”.

    When the “Windows Settings” window opens, click on “Apps“. By default, it should open “Apps and Features” but if it doesn’t, select it from the list on the left.

    Windows 10: Click on Apps

  3. Find the malicious program in the list of installed apps and uninstall it.

    In Apps & Features settings, scroll down to the app list and search for unknown or suspicious programs. To make things easier, you can sort all installed programs by their installation date. To do this, click “Sort by” and select “Install date”.
    Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. When you find a malicious program, click on it and select “Uninstall” in the menu that appears.

    Windows 10: Uninstall malware from Windows

    If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.
  4. Follow the prompts to uninstall the program.

    In the next message box, confirm the uninstall process by clicking on Uninstall, then follow the prompts to uninstall the malicious program.
    Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
    Windows 10: Complete the uninstall process

  1. Go to “Program and Features”.

    Right-click on the Start button in the taskbar, then select “Programs and Features”. This will take you directly to your list of installed programs.
    Right click on Start and select Programs and Features

  2. Search for malicious program and uninstall it.

    The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find any unknown or suspicious program, then click to highlight it, then click the “Uninstall” button.

    Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.

    If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.

    Select malicious program then click on Uninstall

  3. Follow the on-screen prompts to uninstall malicious program.

    In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall malicious program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.

  1. Open the “Control Panel”.

    Click on the “Start” button, then click on “Control Panel“.
    Windows 7 go to Control Panel

  2. Click on “Uninstall a Program”.

    When the “Control Panel” appears, click on “Uninstall a Program” from the Programs category.
    Select Uninstall malicious program from Control Panel

  3. Search for malicious programs and uninstall them.

    The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find any suspicious or unknown program, then click to highlight it, then click the “Uninstall” button.
    Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.

    If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.

    Uninstall malware from Windows 7

  4. Follow the on-screen prompts to uninstall malicious program.

    In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall malicious program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.

If you are experiencing difficulty while attempting to uninstall a program, you can use Revo Uninstaller to completely remove the unwanted program from your computer.

Now that the malicious programs have been removed from your computer, we can proceed with the next step in this guide.

STEP 2: Reset browsers back to default settings

In this step, we will remove spam notifications,  malicious extensions, and change to default any settings that might have been changed by malware.
Please note that this method will remove all extensions, toolbars, and other customizations but will leave your bookmarks and favorites intact. For each browser that you have installed on your computer, please click on the browsers tab below and follow the displayed steps to reset that browser.

ChromeFirefoxMicrosoft EdgeInternet Explorer
Reset Chrome for Windows to default settings

We will now reset your Chrome browser settings to their original defaults. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.

  1. Click the three dots in the top-right corner and then click on “Settings”.

    Open Chrome and click on the menu button (represented by three vertical dots) in the top right corner of the window. In the dropdown menu that opens, click “Settings“. Click on the Chrome menu button then on the Settings button
  2. Click “Advanced”.

    Chrome’s “Settings” should now be displayed in a new tab or window, depending on your configuration. In the left sidebar, click on the “Advanced” link. Click on the Advanced link
  3. Click “Reset and clean up”.

    In the left sidebar, under the “Advanced” section, click on “Reset and clean up“. Click Reset and clean up button
  4. Click “Reset settings to their original defaults”.

    In the main window, the “Reset and clean up” section is visible, as shown in the screenshot below. Click on “Reset settings to their original defaults“. Click on Reset settings to their original defaults
  5. Click “Reset settings”.

    A confirmation dialog will now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset settings” button. Click on Reset Settings to restore Google Chrome to its default settings
  6. (Optional) Reset Chrome Data Sync.

    In case a malicious extension reinstalls itself even after performing a browser reset, you have an additional option to reset the data sync for your browser. To do this, navigate to chrome.google.com/sync and click on the Clear Data button. Chrome Sync Reset
Reset Firefox for Windows to default settings

We will now reset your Firefox browser settings to their default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.

  1. Click the three horizontal lines in the top-right corner and then click on “Help”.

    Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
    Click on the Firefox Menu button then select Help button

  2. Click “More troubleshooting information”.

    From the Help menu, click on “More troubleshooting information“.
    Click More Troubleshooting Information

  3. Click on “Refresh Firefox”

    When the “Troubleshooting Information” page opens, click on the “Refresh Firefox” button.
    Click on Refresh Firefox

  4. Confirm that you want to reset your browser settings.

    To finish the reset process, click on the “Refresh Firefox” button in the new confirmation window that opens.
    Click again on Refresh Firefox button

  5. Click “Finish”.

    Firefox will now close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on “Finish“.

    Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.

Reset Microsoft Edge to default settings

We will now reset your Microsoft Edge browser settings to their default. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.

  1. Click the three dots in the top-right corner and then click on “Settings”.

    In the top right corner, click on Microsoft Edge’s main menu button, represented by three horizontal dots. When the drop-down menu appears, click on “Settings“.
    Click the three dots in the top-right corner and then click on Settings

  2. Click on “Reset Settings”.

    On the left side of the window, click on “Reset Settings“.
    Click Reset Settings option

  3. Click on “Restore settings to their default values”.

    In the main window, click on “Restore settings to their default values“.
    Select Restore settings to their default values

  4. Click “Reset”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset” button.
    Click Reset to reset your browser
    Microsoft Edge will now erase all your personal data, browsing history, and disable all installed extensions. Your bookmarks, though, will remain intact and still be accessible.

Reset Internet Explorer to default settings

We will now reset your Internet Explorer browser settings to their default. You can reset Internet Explorer settings to return them to the state they were in when Internet Explorer was first installed on your computer.

  1. Go to “Internet Options”.

    Open Internet Explorer, click on the gear icon in the upper-right part of your browser, then select “Internet Options“.

  2. Select the “Advanced” tab, then click “Reset”

    In the “Internet Options” dialog box, select the “Advanced” tab, then click on the “Reset” button.

  3. Click on “Reset”.

    In the “Reset Internet Explorer settings” section, select the “Delete personal settings” checkbox, then click on the “Reset” button.

  4. Click on “Close”.

    When Internet Explorer has completed its task, click on the “Close” button in the confirmation dialogue box.
    Close your browser and then you can open Internet Explorer again.

STEP 3: Use Malwarebytes Anti-Malware to remove malware and unwanted programs

In this third step, we will install Malwarebytes to scan and remove any infections, adware, or potentially unwanted programs that may be present on your computer.

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

STEP 4: Use HitmanPro to scan your computer for badware

In this next step, we will scan the computer with HitmanPro to ensure that no other malicious programs are installed on your device.

HitmanPro is a second-opinion scanner that takes a unique cloud-based approach to malware scanning. HitmanPro scans the behavior of active files and also files in locations where malware normally resides for suspicious activity. If it finds a suspicious file that’s not already known, HitmanPro sends it to its clouds to be scanned by two of the best antivirus engines today, which are Bitdefender and Kaspersky.

Although HitmanPro is shareware and costs $24.95 for 1 year on 1 PC, there is no limit on scanning. The limitation only kicks in when there is a need to remove or quarantine detected malware by HitmanPro on your system and by then, you can activate the one-time 30-days trial to enable the cleanup.

  1. Download HitmanPro.

    You can download HitmanPro by clicking the link below.

    HITMANPRO DOWNLOAD LINK
    (The above link will open a new web page from where you can download HitmanPro)
  2. Install HitmanPro.

    When HitmanPro has finished downloading, double-click on “hitmanpro.exe” (for 32-bit versions of Windows) or “hitmanpro_x64.exe” (for 64-bit versions of Windows) to install this program on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on the HitmanPro file

    You may be presented with a User Account Control pop-up asking if you want to allow HitmanPro to make changes to your device. If this happens, you should click “Yes” to continue with the installation.

    Windows asking for permissions to run the HitmanPro setup

  3. Follow the on-screen prompts.

    When HitmanPro starts you will be presented with the start screen as shown below. Click on the “Next” button to perform a system scan.

    Click Next to install HitmanPro on your PC

    HitmanPro final installer screen

  4. Wait for the HitmanPro scan to complete.

    HitmanPro will now begin to scan your computer for malicious programs.
    HitmanPro scans your computer for any infections, adware, or potentially unwanted programs that may be present

  5. Click on “Next”.

    When HitmanPro has finished the scan, it will display a list of all the malware that it has found. Click on the “Next” button to have HitmanPro remove the detected items.

    HitmanPro scan summary. Click Next to remove malware

  6. Click on “Activate free license”.

    HitmanPro may now require to activate the free 30-days trial to remove the malicious files. To do this, click on the “Activate free license” button to begin the free 30 days trial and remove all the malicious files from your computer.
    Click on the Activate free license button

    When the malware removal process is complete, it will display a screen that shows the status of the various programs that were removed. At this screen, you should click on the Next button and then if prompted you should click on the Reboot button. If HitmanPro does not prompt you to reboot, please just click on the Close button.

STEP 5: Use AdwCleaner to remove adware and malicious browser policies

In this final step, we will use AdwCleaner to remove the malicious browser policies that were set by browser hijackers on your computer and delete malicious browser extensions.

AdwCleaner is a free popular on-demand scanner that can detect and remove malware that even the most well-known anti-virus and anti-malware applications fail to find. This on-demand scanner includes a lot of tools that can be used to fix the side effects of adware. browser hijackers and other malware.

  1. Download AdwCleaner.

    You can download AdwCleaner by clicking the link below.

    ADWCLEANER DOWNLOAD LINK

    (The above link will open a new web page from where you can download AdwCleaner)
  2. Double-click on the setup file.

    Double-click on the file named “adwcleaner_x.x.x.exe” to start AdwCleaner. In most cases, downloaded files are saved to the Downloads folder.
    Download AdwCleaner on your computer

    AdwCleaner program will now open and you will be presented with the program’s license agreement. After you read it, click on the I agree button if you wish to continue. If Windows prompts you as to whether or not you wish to run AdwCleaner, please allow it to run.

    Windows ask if you want to run AdwCleaner

  3. Enable “Reset Chrome policies” to remove malicious browser policies.

    When AdwCleaner starts, on the left side of the window, click on “Settings” and then enable “Reset Chrome policies“.

    Enable Reset Chrome policies to remove malicious browser policies

  4. Click on the “Scan” button.

    On the left side of the AdwCleaner window, click on “Dashboard” and then click “Scan” to perform a computer scan.

    Click on Scan to start a AdwCleaner scan

  5. Wait for the AdwCleaner scan to finish.

    AdwCleaner will now scan your computer for malware. This process can take a few minutes.

    AdwCleaner scanning for adware and other malware

  6. Click on “Quarantine” to remove malware.

    When the AdwCleaner scan is completed it will display all of the items it has found. Click on the “Quarantine” button to remove the malicious programs from your computer.

    Click on Quarantine to remove malware

  7. Click on “Continue” to remove the malicious programs.

    AdwCleaner will now prompt you to save any open files or data as the program will need to close any open programs before it starts to clean. Click on the “Continue” button to finish the removal process.
    Click Continue to remove malicious files

    AdwCleaner will now delete all detected malware from your computer. When the malware removal process is complete, you may be asked to restart your computer.

Your computer should now be free of the “Your Computer Has Been Locked” tech support scam and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Removal Instructions for Mac

Remove “Your Computer Has Been Locked” from Mac

To remove “Your Computer Has Been Locked” from Mac, follow these steps:

STEP 1: Remove malicious profiles

Profiles are used by IT admins in businesses to control the behavior of their Macs. These profiles can configure a Mac to do many different things, some of which are not otherwise possible.
When it comes to home users, adware and browser hijackers are using the configuration profile to prevent users from removing malicious programs from the computer. This also prevents the user from changing that behavior in the browser’s settings.

In this first step, we will check your computer to see if any configuration profiles are installed. To do this, follow the below steps:

  1. Open “System Preferences”

    From the Apple menu, select System Preferences.

  2. Search for “Profiles”

    When the System Preferences window opens, search for the Profiles icon.
    Search for Profiles in System Preferences

    If there isn’t a Profiles icon, you don’t have any profiles installed, which is normal and you can continue with the next steps.
  3. Remove the malicious profiles

    If there’s a Profile icon, click on it and select any suspicious profile that you want to remove, and then press the – (minus) button. Click Remove to remove the profile.
    Remove malicious profiles from your Mac

STEP 2: Delete malicious apps

In this second step, we will try to identify and remove any malicious apps and files that might be installed on your computer. Sometimes redirects or adware programs can have usable Uninstall entries that can be used to remove these programs.

  1. Quit the malicious programs

    On the Apple menu bar, in the top-right corner, if you see any unknown or suspicious icon, click on it and then select Quit.

  2. Open “Finder”

    Click the Finder application on your dock.
    Open Finder

  3. Click on “Applications”

    In the Finder left pane, click on “Applications“.
    Click on Applications

  4. Find and remove the malicious app.

    The “Applications” screen will be displayed with a list of all the apps installed on your device. Scroll through the list until you find the malicious app, right-click it, and then click “Move to Trash”.

    Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. Here are some known malicious programs: SearchMine, TakeFresh, TopResults, FeedBack, ApplicationEvents, GeneralOpen, PowerLog, MessengerNow, ImagePrime, GeneralNetSearch, Reading Cursors, GlobalTechSearch, PDFOnline-express, See Scenic Elf, MatchKnowledge, Easy Speedtest, or WebDiscover.

    Find malicious programs and Remove It

  5. Click “Empty Trash”

    On the dock, right-click on the trash icon and select “Empty Trash”. Doing so deletes the Trash’s contents, including the program that you just sent to the Trash.
    Empty Trash

  6. Find and remove the malicious files

    1. Click the desktop to make sure you’re in the Finder, choose “Go” then click on “Go to Folder“.Go to Folder mac
    2. Type or copy/paste each of the below paths into the window that opens, then click Go.
      • /Library/LaunchAgents
      • ~/Library/LaunchAgents
      • /Library/Application Support
      • /Library/LaunchDaemons
      Type the commands in the Go to Folder window

    3. Look out for any suspicious files that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. These are some known malicious files: “com.adobe.fpsaud.plist” “installmac.AppRemoval.plist”, “myppes.download.plist”, “mykotlerino.ltvbit.plist”, or “com.myppes.net-preferences.plist”. When you find a malicious file move it to the Trash.

STEP 3: Reset browsers back to default settings

In this third step, we will remove spam push notifications and malicious extensions, and change to default any settings that might have been changed by malware.
For each browser that you have installed on your computer, please click on the tab below and follow the displayed steps to reset that browser.

Safari BrowserChrome for Mac BrowserFirefox for Mac Browser
Remove malicious extensions and settings from Safari

To remove malware from Safari we will check if there are any malicious extensions installed on your browser and what settings have been changed by this malicious program.

  1. Go to Safari’s “Preferences”.

    On the menu bar, click the “Safari” menu and select “Preferences”.
    On the Menu bar Click on Safari then Preference

  2. Check Homepage.

    This will open a new window with your Safari preferences, opened to the “General” tab. Some browser hijackers may change your default homepage, so in the Homepage field make sure it’s a web page you want to use as your start-up page.

    Change Homepage in Safari

  3. Click “Extensions”

    Next, click on the “Extensions” tab.
    Click on Extensions MacOS

  4. Find and uninstall malicious extensions.

    The “Extensions” screen will be displayed with a list of all the extensions installed on Safari. Look out for any suspicious browser extension that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine extension. By default, there are no extensions installed on Safari so it’s safe to remove an extension
    Click on Uninstall to remove malicious extension

  5. Remove spam notifications ads

    Click Preferences, click Websites, then click Notifications. Deselect “Allow websites to ask for permission to send push notifications”.

    Deselect Allow websites to ask for permission to send push notifications

  6. Remove all data stored by websites on your computer.

    In the Safari menu, choose “Preferences…”, select “Privacy” at the top of the new window that appears, and then click the “Manage Website Data” button.
    Click Manage Website Data

    In the next dialog box, click “Remove All“. It will ask you if you are sure you want to remove all data stored by websites on your computer. Select “Remove Now” to clear data that could be used to track your browsing.

    Click Remove All Website Data

  7. Empty Safari Caches.

    From your Safari menu bar, click Safari and select Preferences, then select the Advanced tab. Enable the checkbox to “Show Develop menu in menu bar“.
    Show Dev Bar

    From the menu bar select Develop, then click on Empty Caches as seen in the image below.
    empty cache

Remove malware from Chrome for Mac

To remove malware from Chrome for Mac we will reset the browser settings to their default. Doing these steps will erase all configuration information from Chrome such as your home page, tab settings, saved form information, browsing history, and cookies. This process will also disable any installed extensions. All of your bookmarks, though, will be preserved.

  1. Click on the three dots at the top right and go to Settings.

    Click on Chrome’s main menu button, represented by three dots at the top right corner. Now click on the menu option labeled Settings as shown by the arrow in the picture below, which will open the basic settings screen. Click on the Chrome menu button then on the Settings button
  2. In the left sidebar, click on the “Reset and Cleanup” option.

    In the left sidebar, click on “Reset and clean up“. Click on Reset and Cleanup
  3. Click “Reset settings to their original defaults”.

    Now click on the “Reset settings to their original defaults”. link as shown in the image below.  Reset Chrome
  4. Click “Reset Settings” button.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset Settings” button. Confirm Reset Chrome browser
  5. (Optional) Reset Chrome Data Sync.

    In case a malicious extension reinstalls itself even after performing a browser reset, you have an additional option to reset the data sync for your browser. To do this, navigate to chrome.google.com/sync and click on the Clear Data button. Chrome Sync Reset
Remove malware from Firefox for Mac

To remove malware from Firefox for Mac we will reset the browser settings to its default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.

  1. Go to the “Help” menu.

    Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
    Image - Click on the Firefox Menu button then select Help

  2. Click “Troubleshooting Information”.

    Next click on the “Troubleshooting Information” option as indicated by the arrow in the image below. This will bring you to a Troubleshooting page.

    Image - Troubleshooting Information option in Firefox Mac

  3. Click on “Refresh Firefox”

    Click the “Refresh Firefox” button in the upper-right corner of the “Troubleshooting Information” page.
    Image - Click on the Refresh Firefox button Mac

  4. Confirm.

    To continue, click on the “Refresh Firefox” button in the new confirmation window that opens.
    Image - Click again on Refresh Firefox button

  5. Click on “Finish”.

    Firefox will close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on the “Finish“.

Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.

STEP 4: Run a scan with Malwarebytes for Mac to remove malware

In this final step, we will scan the computer with Malwarebytes for Mac to find and remove any malicious programs that might be installed on your Mac.

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of the “Your Computer Has Been Locked” tech support scam and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Removal Instructions for Android

Remove “Your Computer Has Been Locked” from Android

To remove “Your Computer Has Been Locked” from Android, follow these steps:

STEP 1: Uninstall malicious apps

In this first step, we will check if any malicious apps are installed on your phone. Sometimes browser hijackers or adware apps can have usable Uninstall entries that can be used to remove these apps.

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find the malicious app.

    The “Apps” screen will be displayed with a list of all the applications that are installed on your phone. Scroll through the list and look out for any suspicious app that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.
    Most often, cyber criminals hide malware inside video or photo editing apps, weather apps, and camera apps.

    Search trough the Apps list for the malicious app
  4. Uninstall the malicious app

    When you find a suspicious or malicious app, tap on it to uninstall it. This won’t start the app but will open up the app details screen. If the app is currently running press the “Force stop” button, then tap on “Uninstall”.
    Uninstall malicious app from Android

    A confirmation dialog should be displayed to confirm you want to uninstall the app, tap on “OK” to remove the malicious app from your phone.

    Confirm uninstall app from Android phone

STEP 2: Reset browsers back to default settings

In this second step, we will reset your browser to its default settings to remove spam notifications, unwated search redirects, and restore its factory settings

Resetting the browser settings to their default it’s an easy task on Windows or Mac computers; however, when it comes to Android, this can’t be done directly because it’s not an option built-in into the browser settings. Restoring the browser settings on Android can be done by clearing the application data. This will remove all the cookies, cache, and other site settings that may have been saved. So let’s see how we can restore your browser to its factory settings.

Chrome for AndroidFirefoxOperaSamsung Internet BrowserMicrosoft Edge

Remove malware from Chrome for Android

To reset Chrome for Android to its default settings, follow the below steps:

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Chrome.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Chrome app, then tap on it to open the app’s details.
    Tap on Chrome

  4. Tap “Storage”.

    When Chrome’s app info menu is displayed, tap on “Storage“.
    Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Chrome’s data including accounts, bookmarks, and your settings to reset the default settings.
    Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
    Tap Ok to restore default settings

Remove malware from Firefox for Android

To reset Firefox for Android to its default settings, follow the below steps:

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Firefox.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Firefox app, then tap on it to open the app’s details.
    Search trough the Apps list for the malicious app

  4. Tap “Storage”.

    When Firefox’s app info menu is displayed, tap on “Storage“.
    Firefox - Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Firefox - Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Firefox data including accounts, bookmarks, and your settings to reset the default settings.
    Firefox - Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.

Remove malware from the Opera browser

To reset the Opera browser to its default settings, follow the below steps:

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Opera.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Opera app, then tap on it to open the app’s details.
    Search trough the Apps list for the malicious app

  4. Tap “Storage”.

    When Opera’s app info menu is displayed, tap on “Storage“.
    Opera - Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Opera - Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Opera’s data including accounts, bookmarks, and your settings to reset the default settings.
    Opera - Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.

Remove malware from Samsung Internet Browser

To reset the Samsung Internet Browser to its default settings, follow the below steps:

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Samsung Internet Browser.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Samsung Internet Browser app, then tap on it to open the app’s details.
    Search trough the Apps list for the malicious app

  4. Tap “Storage”.

    When the Samsung Internet Browser’s app info menu is displayed, tap on “Storage“.
    Samsung Internet Browser - Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Samsung Internet Browser - Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Samsung Internet Browser’s data including accounts, bookmarks, and your settings to reset the default settings.
    Samsung Internet Browser - Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.

Remove malware from Microsoft Edge for Android

To reset the Microsoft Edge for Android to its default settings, follow the below steps:

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Microsoft Edge.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Microsoft Edge app, then tap on it to open the app’s details.
    Search trough the Apps list for the malicious app

  4. Tap “Storage”.

    When the Microsoft Edge’s app info menu is displayed, tap on “Storage“.
    Microsoft Edge - Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Microsoft Edge - Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Microsoft Edge’s data including accounts, bookmarks, and your settings to reset the default settings.
    Microsoft Edge - Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.

STEP 3: Use Malwarebytes for Android to remove malicious apps

In this final step, we will install Malwarebytes for Android to scan and remove malicious apps from your phone or tablet.

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.

Your phone should now be free of the “Your Computer Has Been Locked” tech support scam and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

106 thoughts on “Remove “Your Computer Has Been Locked” Pop-up Scam”

  1. your driections and suggestions are soper duper!!!! it took the image disk to get back some of desktop control……i got internet back!!!! i recomment to anyone to feel save working with Stelial…………thank you Stelial

  2. Oook! I just want to thank you so so much, what a nightmare, I fully thought I was going to wake up to police arresting me some time soon for pedofilia. That would so much awkward explaining with all the lezo porn on my computer. (I’m a 26 yr old chick that’s still in the closet!) My deepest appreciation. You guys rock!! ;) :)

  3. Stelian,
    My deepest thanks to you! Your methodical, step-by-step guide was easy to follow and banished the malware. All best to you!

  4. the virus is away. I can’t go to google. There stands you shall not pass. Can you help me please!!!!

  5. Thank you so much, I was so worried when I got this. I was going to pay the money. it works. is there anything anyone can do ti stop these theives. xx

  6. THANKKK YOUUU SOOO MUCCCH! I was so scared when it first popped up onto my screen, I was actually going to pay the money!

  7. Hello Liz,
    If there is no internet connection, you can try scanning in EWS mode (goto Settings -> Advanced -> Early Warning Scoring and check “I am an Expert”).
    If it still doesn’t work,you’ll need to create a Kaspersky Rescue CD as seen HERE: http://malwaretips.com/blogs/anonymous-virus/ , on Method 2.
    If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
    Good Luck!

  8. Method 1 worked for me on the first try and the ‘police lock screen’ is gone. Right now I’m throwing everything I’ve got at my system, Hitman Pro, MBAM, Norton Anit-Virus. I feel like I just gave birth to a baby from my head. All should be well now. I need to go to bed for 24hrs. Thank you for honest and precise information and straight-forward help, Stelian. I have a raging headache but things could’ve been far worse. I’ve ffed you on google+. Bless you man!

  9. I love you man. Was visiting US in business and i was downloading some stuff and installed flashplayer when this popped up. I got scared to death,acually bought moneypak 200 $ as this was on my work laptop.. but before i acually paid anything my brain started to work and i searched for this thru my phone and i found this. I have to spend 200 $ on ebay instead now.. but thatss far better. Well thanks man u saved me.

  10. The System Restore method worked for me too, but as others have said it takes time so be patient. Really great to have found a solution. Many thanks as it was real worry. It was obviously a scam as the police would not work like that but when you just can’t get into your own computer and are not a techhy, it’s a real worry. Mind you, how the virus got there in the first place is a mystery as I’ve got fully paid up antivirus software! Anyway, great article and thanks.

  11. Hello Ian,
    If Malwarebytes and HitmanPro scans finished without any infected objects being detected, then you have a clean computer.However if you want to make another check, you can run a scan with the below utilities:
    STEP 1: Run a scan with Eset Online Scanner.

    1. Download ESET Online Scanner utility.
      ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
    2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
    3. Check Yes, I accept the Terms of Use
    4. Click the Start button.
    5. Check Scan archives
    6. Push the Start button.
    7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    8. When the scan completes, push Finish

    STEP 2: Run a scan with Emsisoft Emergency Kit.

    1. Please download the latest official version of Emsisoft Emergency Kit.
      EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
    2. After the download process will finish , you’ll need to unpack EmsisoftEmergencyKit.zip and then double click on EmergencyKitScanner.bat
    3. A pop-up will prompt you to update Emsisoft Emergency Kit , please click the “Yes” button.After the Update process has completed , put the mouse cursor over the “Menu” tab on the left and click-on “Scan PC“.
    4. Select “Smart scan” and click-on the below “SCAN” button.When the scan will be completed , you will be presented with a screen showing you the malware infections that Emsisoft Emergency Kit has detected.Make sure that everything is Checked (ticked) and click on the ‘Quarantine selected objects‘ button.

    Stay safe!

  12. Hi Stelian, thanks heaps for your help! The system restore method worked for me to remove the lock screen, easy instructions for even someone as terrible at this stuff as I am. Only thing is, the MalwareBytes scan never found any infected files for me to delete. Does this mean the infected files are still lurking about somewhere, or am I good to go and the system restore has done the job altogether by itself? Cheers anyway mate, good on you for helping computer noobs like me sort this out!

  13. Thank you so much for this advice. Couldn’t quite believe what I was seeing when this nasty little screen popped up. Especially as they took a photo of me too! Horrible stuff but your instructions did the trick.

  14. Hello Oliver,

    Can you start your computer in Safe mode?If yes, boot your computer in Safe Mode with Command Prompt, and type msconfig in the Command prompt OR if you are using Safe Mode with Networking, in the text box, type msconfig.
    This should start the Windows System Configuration tool. Go to the Start-up tab, and search for any suspicious or unknown entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up. Next, start your computer in normal mode and perform a scan with the following tools:

    STEP 1: Run a scan with RogueKiller

    1. Please download the latest official version of RogueKiller.
      RogueKiller Download Link (This link will automatically download RogueKiller on your computer)
    2. Double click on RogueKiller.exe to start this utility and then wait for the Prescan to complete.This should take only a few seconds and then you can click the Scan button to perform a system scan.
    3. After the scan has completed, press the Delete button to remove any malicious registry keys.

    STEP 2: Run a scan with Emsisoft Emergency Kit.

    1. Please download the latest official version of Emsisoft Emergency Kit.
      EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
    2. After the download process will finish , you’ll need to unpack EmsisoftEmergencyKit.zip and then double click on EmergencyKitScanner.bat
    3. A pop-up will prompt you to update Emsisoft Emergency Kit , please click the “Yes” button.After the Update process has completed , put the mouse cursor over the “Menu” tab on the left and click-on “Scan PC“.
    4. Select “Smart scan” and click-on the below “SCAN” button.When the scan will be completed , you will be presented with a screen showing you the malware infections that Emsisoft Emergency Kit has detected.Make sure that everything is Checked (ticked) and click on the ‘Quarantine selected objects‘ button.
  15. Hi. I’ve done everything you have said and when I turn my computer on and log in the same screen comes up! Any ideas why? Cheers

  16. Thanks a lot, the advice worked a treat and helped me sort out my step-daughters laptop. Thanks very much.

  17. It took a fee tries because everytime i tried doing method one or two, after the log in process it would shut my comp down. I took the batery out and tried oonce more amd method two worked like a charm!! Ty s much

  18. thank you so muched. worked perfectly. started in safe mode and downloaded the file, scanned, restarted and now working. many thanks

  19. Hello Karine,
    If you can start your computer in Safe Mode, then you can either download or transfer Malwarebytes from an USB stick on the infected computer and perform a scan…
    Or your second option, is to boot your computer in Safe Mode with Command Prompt, and type msconfig in the Command prompt OR if you are using Safe Mode with Networking, in the text box, type msconfig.
    This should start the Windows System Configuration tool. Go to the Start-up tab, and search for any suspicious or unknonw entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up. Next boot your computer in regular mode and perform a scan with HitmanPro and Malwarebytes as seen on the guide.

  20. Hello Ethan,
    Another possible issue, might be a corrupted driver, can you please try to update or reinstall your Network driver…

  21. Hello Bethany,
    The red x Network icon in your system tray indicates a connection that is not being used. Since your PC is connecting fine to the internet and your home network, more than likely you have more than one possible network connection available for use. Are there any other network adaptors disabled – http://windows.microsoft.com/en-US/windows-vista/Troubleshoot-network-adapter-problems ?
    Another possible issue, might be a corrupted driver, can you please try to update or reinstall your Network driver..

  22. Me again! Um, like another person it says there is no network connection even though I can access the Internet! I followed your steps but when I click view network connections it’s completely blank! Help?! Thankyou

  23. Hello Bethany,
    From a malicious email attachement, a malicious download or a Java exploit, these are the most common infections points.
    Free – Avast 7 Free version or COMODO Internet Security
    Anyway ,you should really start a thread in our Security Configuration forum as you need to build a layered security config: http://malwaretips.com/Forum-Security-Configuration-Wizard
    Also it would very good idea, if you took the time and read this article that I’ve wrote: http://malwaretips.com/blogs/how-to-easily-avoid-pc-infections/ .. If you follow it,then we’ll never meet again in this conditions:)

  24. Thanks so much!! Fixed my computer up nicely, the first method worked a treat after a couple of attempts, do you know how these viruses get picked up? And what’s the best free antivirus program? Thankyou

  25. I am stuck After step 1 , the safe mode network worked well, but from there i had no internet connection , o i could not download Malwarebytes but now I have no Internet connection and a system recovery is not working! What do I do? Was I suppose to download Malwarebytes after I restart or whilst the computer is still on safe mode? Help please!!

  26. Hello Todd,
    Please try one more time to boot from the HitmanPro USB,pay attention at the booting part and click F11 once your computer starts.
    If it still doesn’t work,you’ll need to create a Kaspersky Rescue CD as seen HERE: http://malwaretips.com/blogs/remove-police-trojan/ , on Method 3.
    If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
    Good Luck!

  27. Hi Stelian,
    I cannot start Windows successfuly after inserting the HitmanPro Kickstart USB flash drive.
    No option works for me currently (Safe Mode, Safe Mode with Networking, Safe Mode with Command Prompt or even Starting Windows Normally.

    Appreciate your help,
    Todd

  28. Hi, thank you, but unfortunately I already tried that to no avail. It was already enabled. Any other ideas?

  29. Hello Ethan,
    You most liklely have a network adapter disabled.
    Open Network Connections by clicking the Start button , and then clicking Control Panel. In the search box, type adapter, and then, under Network and Sharing Center, click View network connections.
    Right-click the network adapter icon, and then click Enable. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.

  30. Hello Bishop,
    Please perform a scan with the following tools:
    STEP 1: Run a scan with RogueKiller

    1. Please download the latest official version of RogueKiller.
      RogueKiller Download Link (This link will automatically download RogueKiller on your computer)
    2. Double click on RogueKiller.exe to start this utility and then wait for the Prescan to complete.This should take only a few seconds and then you can click the Scan button to perform a system scan.
    3. After the scan has completed, press the Delete button to remove any malicious registry keys.
    4. Next we will need to restore your shortcuts, so click on the ShortcutsFix button and allow the program to run.

    STEP 2: Run a scan with Kaspersky Virus Removal Tool
    Click here to download the Kaspersky Virus Removal Tool.

    1. Save it to your desktop.
    2. Double click the setup file to run it.
    3. Follow the onscreen prompts until it is installed
    4. Click the Options button (the ‘Gear’ icon), then make sure only the following are ticked:
      • System Memory
      • Hidden startup objects
      • Disk boot sectors
      • Local Disk (C:)
      • Also any other drives (Removable that you may have)
    5. Then click on Actions on the left hand side
    6. Click Select Action, then make sure both Disinfect and Delete if disinfection fails are ticked
    7. Click on Automatic Scan
    8. Now click the Start Scanning button, to run the scan
    9. After the scan is complete, close the program
  31. I did everything you said successfully and removed the Trojan from my laptop. Multiple scans prove that I am now in the clear, however, my network icon in my tray is showing that my Internet is disconnected, but my Internet works fine (although first startup to my homepage takes longer than usual.) I’ve tried many things but I came get it to stop showing the X. Little worried, is it possible I still have a partial virus?

    Thank you for all your help, hope you can help me further.

  32. Hello Jason,
    If there is no internet connection, you can try scanning in EWS mode (goto Settings -> Advanced -> Early Warning Scoring and check “I am an Expert”).
    If it still doesn’t work,you’ll need to create a Kaspersky Rescue CD as seen HERE: http://malwaretips.com/blogs/remove-police-trojan/ , on Method 3.
    If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
    Good Luck!

  33. Hello Liam,
    Once you are at the Command prompt,type in the following:
    For Windows XP: C:\windows\system32\restore\rstrui.exe and press Enter
    For Windows Vista/7/8 : C:\windows\system32\rstrui.exe and press Enter
    If for some reason, it won’t go into the System Restore options, boot your computer in Safe Mode with Command Prompt, and type msconfig in the Command prompt. This should start the Windows System Configuration tool. Go to the Start-up tab, and search for any suspicious or unknonw entries (random numbers or letter, ctfmon.exe and other suspicious entries) and uncheck them from start-up. Next boot your computer in regular mode and perform a scan with HitmanPro and Malwarebytes as seen on the guide.

    If it still doesn’t work,you’ll need to create a Kaspersky Rescue CD as seen HERE: http://malwaretips.com/blogs/remove-police-trojan/ , on Method 3.
    If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance
    Good Luck!

  34. Hi, once I am going into Safe Mode with Command Prompt it starts scrolling type before I can imput ‘cd restore’. I know I have to be quick but I am doing this within seconds but doesn’t type anything on the screen.

    Can you help please…?

  35. I was able to access my menu using Safe Mode with Networking. I completed the quick scan and full scan using Malwarebytes. 90 items were removed. Then, I downloaded and ran 64bit Hitmanpro 3. After restart, i still have the locked screen. What can I do?

  36. Great advice. I used System Restore. It took about an hour, so be patient. The hard disk light kept flickering so I stayed with it. On restarting my computer the blocking Ukash page had gone and my desktop was back! Then I followed the link to run Malwarebytes Anti-Malware. Quick scan picked up about 400 infected files which were easy to remove. Sorted! Thanks again.

  37. Hey matey, just downloaded Hitman Pro Kickstart and ran throught all the points successfully until i got to the scan itself when the program said i had no internet connection (although i have a wireless connection up and running) and was ‘searching for Internet connection’ with a countdown timer of 5 minutes next to it. What can i do now now as Hitman won’t take me any further unless i have a connection (even though i do)?

    Jase x

  38. Hello,
    Just follow the instructions from this guide, and you should be able to easily remove this infection…..Start with Step 1:)

  39. Hi this happened to me on a school laptop, if I go the the IT people do you think they will be able to help me? I’m really scared and even considered ringing the police to sort it out, should I ring the police? Thanks heaps
    leigh

  40. Hello,
    No,the police won’t lock down your computer…so this is nothing more than a scam!
    Stay safe!

  41. Thanks! This helped, but I do have a problem though. It could be nothing, but when the message poped up, it had some of my personal info, name, acount, predetermined username, email, age, this worries me, could it be the reap thing. I mean everything it had was common items found on my computer and nothing big like adress or SS but is their a real copies of the virus that is legit? And does this mean anything? Or is it just me. Thanks

  42. Hi
    Just to thank for your clear instructions, sequence and detail which was totally effective in helping me remove and clean up my PC after being hit by the ‘ your computer has been locked’ and you may go to jail malware. A great service very professionally delivered
    Ian
    Dublin

  43. You r really a life saver, came home and this crap was on and almost lost my mind. Thank you so very much…… your awesome!

  44. Hello Pete,
    The HitmanPro should not take more that 10 – 15 minutes….. Try to start another scan, and if you still have problems, you’ll need to create a Kaspersky Rescue CD as seen http://malwaretips.com/blogs/remove-ukash-virus/, on Method 3.
    If everything fails, then you’ll need to create an account on our forums and a member of the staff will help you (with more advanced tools) to remove this nasty virus: http://malwaretips.com/Forum-Malware-Removal-Assistance

  45. no boot from safe mode or restore point options so I chose option 3 – created hitmanpro to flash and booted from flash drive ok however started to scan and it stopped at “classifying 97%” I left it for over 3 hours and cancelled the scan. Next I attempted a quick scan and that stopped at “classifying99% – can you clarify how long the scan should take as the above instruction video says it should only take a few minutes ………. am I being too impatient??

  46. Thank you so much. Method 2 did the trick for me. Just one to note though, it buggered my Norton up so had to reinstall. Many thanks andy

  47. ______**ANOTHER SOLUTION**______

    This is a solution that worked for me. I had no previous system restore date and Safe Mode with Networking was also being locked.

    In Safe Mode with cmd, I found that it was explorer.exe which triggered the lock.

    So I restarted in Safe Mode with cmd, and before the lock came into effect (there appeared to be a transition lag), I opened up the Task Manager and closed explorer.exe.

    It worked. The lock did not show up, and now I had access to my browser and the internet via Task Manager to install Malwarebytes and rid the computer of the virus. I ran a second scan just to make sure.
    (Just for the record, I actually had opened Internet Explorer before closing explorer.exe, but launching your browser with Task Manager I assume also would work)

    I hope this can be of some help to others. Good luck.

  48. Hello Bram,
    Malwarebytes should have detected the malicious files, nevertheless the HitmanPro scan is free and will only take 5 – 10 minutes…Their is no good reason why you shoudn’t do it! :)
    Stay safe!

  49. Thanks a lot for the helpful solutions above (I had to use the command prompt option asc normal safe mode still gave me the blocked screen). One quick question though, after I scan with Malwarebytes (both quick and full), do you suggest I still run the HitmanPro program? Or is the Malwarebytes enough (it did find an infected file)?

    Kind regards,
    Bram

  50. I have the Police cybercrime virus on my ibm thinkpad computer. I am running windows xp I have done the hitman pro kickstart. I loaded on my desktop computer and then made a usb to load on my infected laptop. It will not recognize my usb. When booting up my usb lights up and looks like it ia available. But I have no access to it during my boot up. What am I missing? Is there something I can do?

  51. Doing the step with command prompt worked for me. Nice job! good advice and I wish the best for you with your shop.

  52. Thank you sooo Much!! It saved my life.. tried method 1 and didnt work but Method 2 worked for me.
    Thank you again as a student it is such a relief i found this blog, because all my neede files are on my laptop.
    Massive thank you!!

  53. Salut Marian,
    Ai incercat vreuna din variantele din articolul asta?Toate sunt usoare de realizat si in functie de ce versiune de virus ai , ar trebui sa rezolve problema ta!
    Sarbatorii fericite!

  54. OMG thank God for you!
    I didn noe what to do but thankfully with this advice, method 2 worked great for me!

    Thank Yu :)

  55. I got over the problem by removing the battery and unplugging the charger.
    I plugged in the charger again and turned on the computer.

    However, although this gets rid of the screen, it erases the history tab for today.
    All other data is left, though.

  56. Hello Matt,
    It looks like you have a more aggressive variant of this virus. Can you please try to format and install back HitmanPro and givinig a try?
    If it doesn’t work, you’ll need to created a Kaspersky Rescue CD as seen in this article, on Method 3.

  57. Step 1, Method 3 + Step 2 = UKASH, down in flames. It also took care of another malware item I didn’t know about. Kudos!

  58. Hey Stelian

    Thanks for the help, but I’m still struggling…

    Methods 1 & 2 are blocked. I’ve got a Kickstart loaded on to a USB and I’m trying method 3. Problem I have is that when I select boot from the flash drive the next screen says to remove disks and hit any key to continue. It won’t continue with the USB in and if I remove it boots to the locked Ukash screen.

    It’s driving me mad. What can I do??

    Thanks again

  59. Succès total et rapide avec la méthode numéro 2. Un gros merci pour avoir partager cette solution. J’imagine qu’elle doit fonctionner pour tous ces types de virus en nous permettant d’avoir accès aux points de restauration du système.

  60. You saved my butt! I thought my computer was getting hacked into.. thanks to you i stopped them! on christmas eve at that!! the best! :)

  61. Mersi frumos Stelian Pilici. Mi-a functionat metoda nr.2. Era cat pe ce sa pun botul la virusul asta ciumeg. mai salvat de o reformatare. Inca odata multumesc mult, sa ai Sarbatori Fericite si Un An Nou Fericit! (Respect efortul si munca ta.)

  62. Thank you, thank you! When my miscreant daughter picked this up at midnight yesterday I thought that was the end of one lappie and the loss of a great deal of university work. I figured I needed to do something from safe mode but had no idea of the instructions to run Restore from a command prompt. You just saved us one unhappy Christmas.

  63. Hello Adissa,
    You should’ve have used just only one of the methods , but even if you used both that’s not a problem.
    If the Malwarebytes scan and HitmanPro came up clean then your computer is good to go!
    Stay safe!

  64. This website helped me a lot but I am still confused. Because when I did the cd restore…and started it on again the screen with the virus (locked computer) didnt appear. And I didnt use a usb to install the scanning tool. I just downloaded it from my actual (infected computer) and i could see any results of that virus …there where 1 or two ..but not called spyware more like GSA i think. So is my computer safe now? has it been removed or not? Thanks again.

  65. I called the police in a panic. Once I got my head together, your website was a blessing. The first time attempted method 1, it didn’t offer a place to type in commands. I tried again and it was a success. Warning “don’t let kids use your laptop and watch freetv!”. Thanks a bunch for the help. Merry Christmas…whhohoo

  66. Thanks a lot. Got infected by virus (Ukash). Used method 1 and I fixed the problem. Your a good man

    Thanks very much.

Comments are closed.