computer crime & intellectual property section

The “computer crime & intellectual property section” warning being given off when users turn on their computer is a false warning. This has nothing to do with the U.S. government.

This exact scam has been on-going for two years now. The name and file traces keep changing but it’s all the same. Do a search on FBI Money Pak or ICE Cyber Crimes and you will see examples of other similar scams just under different names.

The warning messages given off from computer crime & intellectual property section scam can be very scary. It accuses you of downloading and pirating copyrighted material as well as certain other items that are against the law. Your IP address is shown and if you have a web cam it can snap a picture of you.

The data is not actually being sent anywhere. It’s all a trick to make this operation look legit and scare you into paying a fine. It’s all false so don’t fall for it.

Manual Removal is not recommended as it may cause severe system damage. The simplest way to remove is to use an antivirus program that is known to work against this threat.

What Damage Is Being Done?

This malware client will block the install of most newer programs and limit what computer programs can run on the system. The software is basically trying to limit the use of your computer so you are forced into paying for the false fine. Expert help may be needed if you are unable to end the virus executables or install and antivirus client to remove the threat.

Automatic Virus Removal

pctech-spyhunterboxSpyHunter is very user friendly, providing you with a simple interface that will allow you to properly understand the options and functions available. SpyHunter succeeds at both cleaning your already infected computer from viruses and to prevent virus infections in the future. Simply put IT WORKS!




Online Virus Removal Service

pctech-ninjaboxDo you need Expert Help! has experts standing by that can fully remove this virus from your computer. Based in the U.S.all repairs are down by certified computer repair experts. They have fixed thousands of computers over the years and is proud to recommend this U.S. based company to service your computer. Visit or call 1-888-392-2785

8am-10pm PST

Computer Crime & Intellectual Property Section Manual Removal Procedures

We do not recommend manual removal but you can still do it.

To start you need to kill off the main program that is locking your computer and showing you the warning message. The exact location and name of the file constantly changes and yours won’t be the exact same as the traces we show. However it should give you a good indication of what to look for. We also list several ways of searching for the virus threat.

  • [random].exe ( Example is 6CB34JGG0G4095TUGJ30K30R943RKJF55K4.EXE ) Your file trace will be named different. Every infection will have a different name. However the file tends to hide in the same location

Some Tips on Locating the file.

Known File Paths. To view these file paths you will need to either manually type them in or show hidden files and folders. Learn how to at

  • C:\Documents and Settings\USER NAME\Local Settings\Application Data

Windows Vista/ Windows 7/ Windows 8:

  • c:\ProgramData\6CB34JGG0G4095TUGJ30K30R943RKJF55K4.EXE
  • c:\ProgramData\6CB34JGG0G4095TUGJ30K30R943RKJF55K4.ICO
  • c:\ProgramData\6CB34JGG0G4095TUGJ30K30R943RKJF55K4

A. Browse to the file location shown above under File Locations and re-name the file first and then restart your computer. Then browse to that file location again and delete the file. You can not delete a file while it is in use.

While you may not know the exact name of the file here are a few tips to locate it.

A1. The file will not be named something that makes sense, it will be jumbled like 6CB34JGG0G4095TUGJ30K30R943RKJF55K4.EXE

A2. You can sort the file by date in the folder and see which ones have been installed in the last few days. In most cases you will only have 1-3 files that match the time of your infection. From there it should be easy to see which one is the one you need to re-name.

B. Boot into Safe Mode with networking and download an Antivirus client and run a full scan. We like SpyHunter

C: Log-into another users account and see if you can delete the file. Again use the File Locations below to locate the file

D: Start the Task Manager the very second you login and terminate the process that way.

After you have killed off the file you have to run a full virus scan. We already mentioned which AV client we like to use. You can use another if you like. Just be sure to run a full scan. This is to ensure you have everything and no other threats are present on the computer.

SpyHunter Download