Police Cybercrime Investigation Department virus (ransomware)

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

The warning supposedly sent by the Canadian Police (its Cybercrime Investigation Department) is a brand new ransomware infection (virus) that has been recently prepared by the team of cyber fraudsters. It primarily attacks users in Canada, even though the US customers are not an exception, so their PCs may be targeted by this virus as well. This is another money-chasing campaign arranged by hackers to swindle money from potential victims by means of fraud, deception, scaring and tricking simple users like you and I. This is the warning that should definitely be ignored and disregarded, otherwise there’s a serious risk of you losing your funds considerably, without the chance of getting it back. Here is what the fake police warning says in this case:

Police Cybercrime Investigation Department

Attention! Your PC is blocked due to at least one of the reasons specified below.
You have been violating Copyright and Related Rights Law (Video, Music, Software) and illegally using or distributing copyrighted content, thus infringing Article 128 of the Criminal Code of Canada.
Article 128 of the Criminal Code provides for a fine of two to five hundred minimal wages or a deprivation of liberty for two to eight years.
You have been viewing or distributing prohibited Pornographic content (Child Porno/Zoofilia and etc.), thus violating article 202 of the Criminal Code of Canada. Article 202 of the Criminal Code provides for a deprivation of liberty for four to twelve years.
Illegal access to computer data has been initiated from your PC, or you have been…
Article 208 of the Criminal code provide for a fine of up to Cad 100,000 and/or a deprivation of liberty for four to nine years.
Illegal access has been initiated from your PC without your knowledge or consent, your PC may de infected by malware, thus you are violating the law on neglectful use or personal computer.

No doubt, it is quite scary to get such a message when you are not prepared to meet it and don’t know what it’s all about. You must know from this very moment that the contents of this notice are totally fake and not supported by real truth. This scareware program is surely a masterpiece of trickery, but you must not follow its instructions. Do not ever donate any money as a fine or penalty through Ukash or Paysafecard payment systems. Instead, make sure and immediately search for the right solution that will help you get rid of this problem and unlock your PC from this serious screen locker. Below please find good instructions that will help you overcome this problem effectively.

Ransomware unlocking procedure

Note! This tutorial is effective for all GreenDot MoneyPak, Ukash and Paysafecard ransomwares.

  1. Restart your computer and press F8 while it is restarting.
  2. Choose safe mode with networking.
  3. safe mode with networking

  4. Press Start menu and select Run, or press [Win]+R on keyboard.
  5. Run command

  6. Type msconfig
  7. msconfig

  8. Disable startup items rundll32 turning on any application from Application Data.
  9. Restart your system once again.
  10. Scan your system with GridinSoft Trojan Killer to identify file and delete it.

Some versions of these viruses disable all safe modes, but give a short gap that you can use to run anti-malware programs. Then do following:

  1. Reboot normally.
  2. Click Start and choose Run.
  3. Enter the text specified in the quotation below. If malware is loaded, just press Alt+Tab once and keep entering the string blindly then press Enter.
  4. https://trojan-killer.net/download.php

  5. Press Alt+tab and then R (letter) a couple of times. The process of ransomware virus should be killed after you succeed to download, install our recommended software and scan your PC with it.

Download GridinSoft Trojan Killer for thorough system checkup

(Visited 495 times, 1 visits today)

Related posts:

Leave a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.