How to Remove Your computer is locked (Virus Removal)
Your computer is locked! is a message displayed on a screenlocker by a computer virus known as ransomware. The virus will lock a computer and restrict user access by using a screenlocker that contains a message.
Overview
- Restricts access to the computer by using a screenlocker that contains a deceptive message
- Claims unusual activity has been detected on your computer and that your computer might be at risk
- Tries to persuade victims to call a fake Microsoft Technician and telephone support phone number
- An unlock code can be used to bypass the screenlocker: 01548764GHEZG784
What is Your computer is locked?
“Your computer is locked” virus is a ransomware infection authored by Soren805 that locks a victim’s computer screen by using a screenlocker. The virus is notable for being a tech support scam because it will lock a computer screen in place and display a message that bolsters a fraudulent tech support phone number.
Ransom Note
Your computer has been locked. But dont worries, the files will never delete. Just your computer is locked because your computer has viruses. If you want the code, contact the nearest microsoft technician. The reason A unusal activity has been detected on your computer. Your computer might be at risk, and this is the reason the locked your computer. Click on the button to contact the nearest microsoft technician. Click on the button to contact it. Nearest Microsoft Technician found Contact: +62 067885169823 |LINE ID: technician460 This virus has been made by Soren805. If you want to remove it, press OK. This virus disable Alt + F4, CTRL + ALT + DEL and kill explorer.exe. Inscruction: 1.Go to start menu 2.Go to All programs 3.Go to Startup 4.Remove the file named Sec.exe If you press OK your computer will now go Normal (Enable task manager) etc...
It is not recommended to pay ransomware authors or to call a fake technician to decrypt your files unless you have no other choice. Instead of supporting cyber criminals by paying the ransom you can use programs like Shadow Explorer, PhotoRec, or Recuva to restore corrupted files.
Distribution Methods
Your computer is locked virus is usually distributed via malicious spam email attachments, exploit kits, torrent files, and instant message spam. The ransomware usually employs social engineering in order to trick unsuspecting victims into downloading a file under the guise that it is something it is not such as a game patch, game crack, media player, media update, or email about your income. Once the file is manually executed by the user ransomware will begin to advance on the computer system and carry through it’s various functions.
How to Remove Your computer is locked Virus
1. Bypass the screenlocker by inputting this unlock code: 01548764GHEZG784
2. Download and Install Malwarebytes Anti-Malware software to detect and remove malicious files from your computer.
3. Open Malwarebytes and click the Scan Now button – or go to the Scan tab and click the Start Scan button.
4. Once the Malwarebytes scan is complete click the Remove Selected button.
5. To finish the Malwarebytes scan and remove detected threats click the Finish button and restart your computer if promoted to do so.
6. Download and Install HitmanPro by Surfright to perform a second-opinion scan.
7. Open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.
8. Once the HitmanPro scan is complete click the Next button.
9. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.
10. Click the Reboot button.
How to stay protected against future infections
The key to staying protected against future infections is to follow common online guidelines and take advantage of reputable Antivirus and Anti-Malware security software with real-time protection.
Real-time security software
Security software like Malwarebytes and Norton Security have real-time features that can block malicious files before they spread across your computer. These programs bundled together can establish a wall between your computer and cyber criminals.
Common Online Guidelines
- Backup your computer and personal files to an external drive or online backup service
- Create a restore point on your computer in case you need to restore your computer to a date before infection
- Avoid downloading and installing apps, browser extensions, and programs you are not familiar with
- Avoid downloading and installing apps, browser extensions, and programs from websites you are not familiar with – some websites use their own download manager to bundle additional programs with the initial download
- If you plan to download and install freeware, open source software, or shareware make sure to be alert when you install the object and read all the instructions presented by the download manager
- Avoid torrents and P2P clients
- Do not open email messages from senders you do not know