Komenda Glowna Policji virus is a dangerous ransomware, which seeks to make people believe that they have violated various laws. For that, it claims about the illegal use of copyrighted content, distribution of malware and similar problems detected. Just like Polska Policja virus, this Polish virus attacks its target country only, but there are many other threats that hail from Ukash group of viruses. They typically apply legitimate logos, copy the existent laws and use similar details that are expected to trick people into believing that they have a deal with a real police. Before you start believing Komenda Glowna Policji virus or other ransomware, remember that legitimate organizations don’t block computers for punishing their criminals. You must remove Komenda Glowna Policji virus ASAP.
HOW CAN I GET INFECTED WITH Komenda Glowna Policji virus?
Komenda Glowna Policji virus is spread by Trojan horse, which is named Trojan.Lockscreen. As soon as it gets inside, it blocks the system and shows a misleading message, which is written in Polish. This screen locker foolishly claims about illegal users’ activities on the Internet and asks to pay a fine for these crimes. Interestingly, scammers use legitimate prepayment systems, such as Ukash, Paysafecard or Paydot, for stealing those money. Please, never pay the fine, which is asked by Komenda Glowna Policji virus, because you haven’t violated any law no matter what it claims. Additionally, this doesn’t help when trying to unblock the system. For that, you should follow some special steps and then scan your PC with anti-spyware.
HOW TO REMOVE KOMENDA GLOWNA POLICJI VIRUS?
As we have said, paying the fine for Komenda Glowna Policji virus doesn't help to remove the lock and get rid of its infected files. For that, you should follow these steps:
* Flash drive method:
1. Take another machine and use it to download Reimage, Malwarebytes MalwarebytesCombo Cleaner or Plumbytes Anti-MalwareMalwarebytes Malwarebytes.
2. Update the program and put into the USB drive or simple CD.
3. In the meanwhile, reboot your infected machine to Safe Mode with command prompt and stick USB drive in it.
4. Reboot computer infected with Ukash virus once more and run a full system scan.
* Users infected with Ukash viruses are allowed to access other accounts on their Windows systems. If one of such accounts has administrator rights, you should be capable to launch anti-malware program.
* Try to deny the Flash to make your ransomware stop function as intended. In order to disable the Flash, go to Macromedia support and select 'Deny': http://www.macromedia.com/support/documentation/en/flashplayer/help/help09.html. After doing that, run a full system scan with anti-malware program.
* Manual Ukash virus removal:
- Reboot you infected PC to 'Safe mode with command prompt' to disable Ukash virus (this should be working with all versions of this threat)
- Run Regedit
- Search for WinLogon Entries and write down all the files that are not explorer.exe or blank. Replace them with explorer.exe.
- Search the registry for these files you have written down and delete the registry keys referencing the files.
- Reboot and run a full system scan with updated Reimage, Malwarebytes MalwarebytesCombo Cleaner or Plumbytes Anti-MalwareMalwarebytes Malwarebytes to remove remaining virus files.