Remove Your computer has been locked Ransomware

The Your computer has been locked. lockdown  is a ransomware alert that is locking your computer, and posing as an official notice from the Royal Canadian Mounted Police , claims that the your PC has been determined to have visited illegal websites.In reality, none of what the Royal Canadian Mounted Police screen is reporting is real, and the alert is only used to scare you into paying for a non-existing fine and stealing your personal financial information.
If you’ve got a Your computer has been locked. ransomware infection , you’ll be seeing this screens :

Royal Canadian Mounted Police Alert
Royal Canadian Mounted Police fake alert

Here is what the Your computer has been locked fake screen says:
Your computer has been locked!
Warning!
Your computer has been locked due to violation of the law in Canada.
The following violations have been revealed:
- The act of the film shooting. Registration or transfer of documents with pornographic content involving minors, child pornography, sodomy and violence against children. The punishment provided by Article 163.1/164 of the Criminal Code of Canada entails imprisonment for a term of 5 to 7 years.
- Software copyright violation. The punishment provided by Article 432 of the Criminal code of Canada entails imprisonment for a term of 3 to 5 years.
- Sending multimedia files with copyright violation. The punishment provided by Article 432.2 of the Criminal Code of Canada entails imprisonment for a term of 1 to 3 years.
To unlock your computer, you have to pay a fine in accordance with Canadian law in the amount of 100 euros. A penalty in the form of fine is possible only if it is your first violation. Repeated violation entails criminal liability. If you do not pay the fine, your computer will be confiscated and your case will be referred to the Court.
You can pay the fine through our partner or by using Ukash voucher. You can get Ukash voucher for the amount of $250, then fill in the form, specifying a voucher code and then click on the “Pay the fine” button.
1. Your computer will be unlocked right after authenticity control of Ukash voucher. Usually it takes about 1-4 hours. Find your nearest store terminal
2. As for a Ukash voucher for $250
3. Give the retailer your cash including your fee
4. The shopkeeper will print your voucher with a 19-digit Ukash PIN
5. Take the voucher and pay the fine
Where can I buy Ukash?
You can get Ukash from hundreds of thousands of global locations, online, from wallets, from kiosks and ATMs. Visit ukash.ca for more information. Instore – get your Ukash from any of the 15,000+ locations with a Now Prepayment terminal.

We strongly advise you to follow our Royal Canadian Mounted Police ransomware removal guide and ignore any alerts that this malicious software might generate.Under no circumstance should you send any any money to this cyber criminals as this could lead to identity theft.

Removal Instructions for Royal Canadian Mounted Police ransomware

We will be using the Kaspersky Rescue Disk Bootable CD to clean the Windows registry and to perform a system scan to remove the malicious files.
What you’ll need to perform this removal guide :

  1. A computer with Internet access.
  2. 1 blank DVD or CD
  3. 1 DVD/CD Burner
  4. Software which can create a bootable CD –  http://www.imgburn.com/index.php?act=download
  5. A copy of the latest Kaspersky Rescue Disc from here –  http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/
  6. About 1 -2  hours depending on how much data you have on C:

STEP 1: Download and create a bootable Kaspersky Rescue Disk CD

  1. Download the Kaspersky Rescue Disk ISOimage from below.
    KASPERSKY RESCUE DISK DOWNLOAD LINK (This link will open a new page from where you can download Kaspersky Rescue Disk ISO)
  2. Download ImgBurn, a software that will help us create this bootable disk.
    IMGBURN DOWNLOAD LINK (This link will open a new page from where you can download ImgBurn)
  3. You can now insert your blank DVD/CD in your burner.
  4. Install ImgBurn by following the prompts and then start this program.
  5. Click on the Write image file to disc button.
    Create bootable CD step1
  6. Under ‘Source’ click on the Browse for file button, then browse to the location where you previously saved the Kaspersky Rescue Disk ISO file.(kav_rescue_10.iso)
    Create bootable CD step2
  7. Click on the big Write button.
    Create bootable CD step3
  8. The disc creation process will now start and it will take around 5-10 minutes to complete.

STEP 2:Configure the computer to boot from CD-ROM

  1. Use the Delete or F2 keys, to load the BIOS menu.Information how to enter the BIOS menu is displayed on the screen at the start of the OS boot:
    Boot into Bios
  2. In your PC BIOS settings select the Boot menu and set CD/DVD-ROM as a primary boot device.
    Boot into BIOS Step2
  3. Insert your Kaspersky Rescue Disk and restart your computer.

STEP 3:Boot your computer from Kaspersky Rescue Disk

  1. Your computer will now boot from the Kaspersky Rescue Disk,and you’ll be asked to press any key to proceed with this process
    Kaspersky Rescue Disk 1
  2. In the start up wizard window that will open, select your language using the cursor moving keys. Press the ENTER key on the keyboard.
    Kaspersky Rescue Disk 2
  3. On the next screen, select Kaspersky Rescue Disk. Graphic Mode then press ENTER.
    Kaspersky Rescue Disk 3
  4. The End User License Agreement of Kaspersky Rescue Disk will be displayed on the screen. Read carefully the agreement then press the C button on your keyboard.
    Kaspersky Rescue Disk 4
  5. Once the actions described above have been performed, the Kasprsky operating system will start.

STEP 4: Launch Kaspersky WindowsUnlocker to remove the Your computer has been locked malicious registry changes

This virus has modified your Windows system registry so that when you’re trying to boot your computer it will instead launch his lock screen.To remove this malicious registry changes we need to use the Kasersky WindowsUnlocker from Kaspersky Rescue Disk.

  1. Click on the Start button located in the left bottom corner of the screen and select the Kaspersky WindowsUnlocker.
    Kaspersky Rescue Disk WindowsUnlocker 1
    Alternatively you can select Terminal and in the command prompt type windowsunlocker and then press Enteron the keyboard.
  2. A white colored console window will appear and will automatically start loading the registry files for scanning and disinfection. The whole process will take only a couple of seconds and after this process you should be able to boot your computer in normal mode.
    Kaspersky Rescue Disk WindowsUnlocker 2

STEP 5:Scan your system with Kaspersky Rescue Disk

  1. Click on the Start button located in the left bottom corner of the screen and select the Kaspersky Rescue Disk then click on My Update Center and press Start update.
    Kaspersky Bootable Cd scan 1
  2. When the update process has completed, the light at the top of the window will turn green, and the databases release date will be updated.
    Kaspersky Bootable Cd scan 2
  3. Click on the Objects Scan tab, then click Start Objects Scanto begin the scan.
    Kaspersky Bootable Cd scan 3
  4. If any malicious items are found, the default settings are to prompt you for action with a red popup window on the bottom right. Delete is the recommended action in most cases but we strongly recommend that you try first to disinfect , and if it doesn’t work chose to quarantine the infected files just to be on the safe side.
    Kaspersky Bootable Cd scan 5
  5. When all detected items have been processed and removed, the light in the window will turn green and the scan will show as completed.
    Kaspersky Bootable Cd scan 7
  6. When done you can close the Kaspersky Rescue Disk window and use the Start Menu to Restart the computer.

STEP 6: Download and scan with Malwarebytes Anti-Malware FREE to remove any left over malicious files from your computer.

  1. Download and run Malwarebytes Anti-Malware FREE
    MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK
  2. Install Mawlarebytes Anti-Malware by following the prompts. Do not make any changes to the default installation settings and do not restart your computer if asked so.
    [Image: install-malwarebytes.png]
  3. On the Scanner tab,please select Perform full scan and then click on the Scan button to start scanning your computer for any possible infections.
    [Image: malwarebytes-full-system-scan.png]
  4. When the scan is finished click the ‘OK‘ button and then you will be presented with a screen showing you the malware infections that Malwarebytes’ Anti-Malware has detected.
    Make sure that everything is Checked (ticked) and click on Remove Selected button.
    [Image: malwarebytes-scan-results.png]
  5. Malwarebytes’ Anti-Malware will now start removing the malicious files.If during the removal process Malwarebytes will display a message stating that it needs to reboot, please allow this request.

If you are still experiencing problems while trying to remove Polisen Enheten for databrott alert from your machine, please start a new thread in our Malware Removal Assistance forum.

10 Rules to Avoid Online Scams

Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.

  1. Stop and verify before you click, log in, download, or pay.

    warning sign

    Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).

    If you already clicked: close the page, do not enter passwords, and run a malware scan.

  2. Keep your operating system, browser, and apps updated.

    updates guide

    Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.

    If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.

  3. Use layered protection: antivirus plus an ad blocker.

    shield guide

    Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.

    If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.

  4. Install apps, software, and extensions only from official sources.

    install guide

    Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.

    If you already installed something suspicious: uninstall it, restart, and scan again.

  5. Treat links and attachments as untrusted by default.

    cursor sign

    Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.

    If you entered credentials: change the password immediately and enable 2FA.

  6. Shop safely: research the store, then pay with protection.

    trojan horse

    Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.

    If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.

  7. Crypto rule: never pay a “fee” to withdraw or recover money.

    lock sign

    Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.

    If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.

  8. Secure your accounts with unique passwords and 2FA (start with email).

    lock sign

    Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.

    If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.

  9. Back up important files and keep one backup offline.

    backup sign

    Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.

    If you suspect infection: do not connect backup drives until the system is clean.

  10. If you think you are a victim: stop losses, document evidence, and escalate fast.

    warning sign

    Move quickly. Speed matters for disputes, account recovery, and limiting damage.

    • Stop payments and contact: do not send more money or respond to the scammer.
    • Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
    • Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
    • Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
    • Scan your device: remove suspicious apps or extensions, then run a full malware scan.
    • Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
    • Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.

These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.

5 thoughts on “Remove Your computer has been locked Ransomware”

  1. HI, in safe mode we don’t see the Next key so can’t start the program.

    with this trojan, only safe mode command prompt works. Can you fix your program to work in the safe mode command prompt? the screen is very low res in safe mode.

    this trojan also comes up in safe mode networking so can’t run anything

    thanks

    • Hello,

      Post was updates,please create and use a Kaspersky Rescue Disk to get rid of this infection! :)

Comments are closed.

Previous

Remove Windows Advanced User Patch (Uninstall Guide)

Next

Remove Best Antivirus Software malware (Uninstall Guide)