FreePrograms.me

Windows is blocked

Виндовс заблокирован

Windows is blocked - what to do? How to remove a banner from your computer? Don’t be afraid and don’t rush to take it to the service center. After all, I have prepared for you several ways to remove the ransomware banner in Windows 7.

This virus almost completely blocks the system (you cannot use safe mode, Task Manager and other functions). A message is displayed on the screen that requires the computer owner to pay money (via a terminal or SMS). After this, the virus will supposedly cease to act. In fact, this is not so; the computer will not be unlocked. Therefore, there is no need to send your funds to anyone somewhere.

This disease has brought a lot of harm to ordinary users, although its authors, without a doubt, have considerable income in this matter. In addition, the virus is constantly improving, which makes it more dangerous. It is worth noting that such blocking can only happen on an unlicensed version of Windows, because the licensed version is constantly updated. In addition, the virus is very complex. It is not just registered in startup (like many others). It is embedded much deeper, so it works both in safe mode and when loading only drivers and services. Getting the computer to work after this is quite a difficult task.
This article will look at how to remove the virus, as well as difficulties that may arise after doing so (for example, a clean desktop).

The methods under consideration are suitable for almost all modifications of this type of virus. Now let's look at these options.
Solving the system lock problem


Method 1. Unlock codes
There are codes for unlocking Windows on the Dr.Web antivirus website (link https://www.drweb.com/xperf/unlocker/). Select a screenshot of your virus, after which you will see the unlock code. You can also enter the phone number (to which the virus asks to send money), click “find” and receive the corresponding code. After the procedure, we treat the computer with a regular antivirus. The situation when, after unlocking, you have a clean desktop, will be discussed at the end.


Method 2. Using the avz utility 
1. A computer and a disk (or flash drive) are required.
2. Download the utility and write it to removable media.
3. Before booting the system, you need to select options for booting (to do this, press F8 at the very beginning of the process). Select the “Safe Mode with Command Line Support” option.
4. If everything goes well, the command line will appear after the system boots.
5. Insert the removable media into the computer.
6. Type explorer on the command line and press enter.
7. The traditional “My Computer” should appear.
8. Go to the flash drive or disk and run the avz.exe utility.
9. Next, go to the “File - Troubleshooting Wizard” functions, then “System problems” - “All problems” and click the “Start” button. In the window, check all the boxes except “Automatic system updates are disabled” and those that begin “Allow autorun from...”. Next, click “Fix noted problems.”
10. We also do: “Browser settings and tweaks” – “All problems”, check all the boxes there and, by analogy, click the “Fix noted problems” button.
11. In addition, select “All problems” in the “Privacy” section and correct the noted problems there (and all of them should be).
12. Close the window, remaining in AVZ. In the program, click “Tools” – “Explorer Extensions Manager” and uncheck all the items written in black.
13. Next, turn on “Service” – “IE Extensions Manager” and delete absolutely all lines in the list that appears.
14. If after restarting the computer there are no more problems, we clean it with a traditional antivirus.
If the manipulations described above do not lead to the desired result, you need to either use one of the methods below, or use the same methods to launch AZV and conduct a full scan of the computer there.


Method 3. Using a script.
1. A computer and a disk (or flash drive) are required.
2. Download the utility and write it to removable media.
3. Before booting the system, you need to select options for booting (to do this, press F8 at the very beginning of the process). Select the “Safe Mode with Command Line Support” option.
4. If everything goes well, the command line will appear after the system boots.
5. Insert the removable media into the computer.
6. Enter explorer on the command line and press enter.
7. The traditional “My Computer” should appear.
8. Go to the flash drive or disk and run the avz.exe utility.
9. In the program window, open the “File” tab and click on the “Run script” operation.
10. Enter the following script into the window that appears.

begin

SearchRootkit(true, true);

SetAVZGuardStatus(True);

QuarantineFile('C:\Documents and Settings\Your_Account\Local Settings\Temporary Internet Files\Content.IE5\FNM62GT9\lexa2[1].exe','');

QuarantineFile('C:\RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1013\ise32.exe','');

QuarantineFile('C:\Program Files\AskBarDis\bar\bin\askBar.dll','');

DelBHO('{638E9359-625E-4E8A-AA5B-824654C3239B}');

DelBHO('{1A16EC86-94A1-47D5-A725-49F5970E335D}');

QuarantineFile('C:\Documents and Settings\All Users\Application Data\zsglib.dll','');

QuarantineFile('C:\Documents and Settings\All Users\Application Data\phnlib.dll','');

QuarantineFile('Explorer.exe csrcs.exe','');

QuarantineFile('C:\WINDOWS\System32\drivers\68ed4e7b.sys','');

DeleteFile('C:\WINDOWS\System32\drivers\68ed4e7b.sys');

DeleteFile('Explorer.exe csrcs.exe');

DeleteFile('C:\Documents and Settings\All Users\Application Data\phnlib.dll');

DeleteFile('C:\Documents and Settings\All Users\Application Data\zsglib.dll');

DeleteFile('C:\Program Files\AskBarDis\bar\bin\askBar.dll');

DeleteFile('C:\RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1013\ise32.exe');

DeleteFile('C:\Documents and Settings\Your_Account\Local Settings\Temporary Internet Files\Content.IE5\FNM62GT9\lexa2[1].exe');

DelBHO('{1F460357-8A94-4D71-9CA3-AA4ACF32ED8E}');

DelBHO('{3041d03e-fd4b-44e0-b742-2d9b88305f98}');

DelBHO('{201f27d4-3704-41d6-89c1-aa35e39143ed}');

DelCLSID('{28ABC5C0-4FCB-11CF-AAX5-81CX1C635612}');

DeleteFileMask('C:\Documents and Settings\Your_Account\Local Settings\Temporary Internet Files\Content.IE5', '*.*', true);

BC_ImportDeletedList;

ExecuteSysClean;

BC_Activate;

RebootWindows(true);

end.


Important: in place of the text Your_account, enter the name of your account in the system. This is either administrator, or user, or Andrey, Petya, or anything else, that is, the name that is used to log into Windows.
1. Click “Run” and wait for the script to finish its work.
2. If the problem disappears after a reboot, we scan and clean the system with a traditional antivirus. If the option does not work, you need to use the same methods to launch AZV and conduct a full scan of the computer there.


4 method
Suitable for older versions of the virus in question. But it is more likely to clear one’s conscience, since the likelihood that it will work is not that great. Immediately after turning on the computer, press the Delete button and go to the BIOS. There we set the system clock either a week ago or a week forward. Then the virus may (not necessarily) turn off. After this, we start the system and completely scan it with a regular antivirus or antivirus utility Dr.Web CureIt. He must detect a virus lying on the computer and neutralize it.


Method 5: Using the LiveCD application.
The LiveCD program from the Dr.Web brand can help defeat the antivirus. Its task is to scan the system from disk and clean it of all those diseases that block its operation.

First, download the LiveCD program from the Internet.
Next you need to complete the installation. To do this, the image must be written to disk. There are many different ways to do this. Here is one of them:
1. Insert a blank disk into the drive;
2. Download a special recording program - SCD Writer.
3. Download the image of the LiveCD program itself from the Internet.
4. Launch the SCD Writer application, select “Disk” in it, click “Burn image to disk”. We indicate the path to the LiveCD image located on the hard drive, set the recording speed and wait for the process to complete.

Now you need to set the parameters so that when you turn on the computer, the system boots not from the hard drive, but from the CD. To perform this task, you need to go into the BIOS (at the very beginning of starting the computer, press the Delete key). Then we go to the Boot section (that is, downloading). A list of the order of media from which the system starts will appear there. By default this is the hard drive. We need to configure this parameter so that the first place is not the hard drive, but the disk located in the drive. We do this using the keyboard (the mouse does not work in the BIOS). The computer will now boot using the data from the disk.

Save the changes and restart the computer. After loading from the disk, select the first item in the menu that appears. Next, turn on Dr.WebScanner, click “Start” and wait for completion. After the program processes the viruses, select the “Delete” option.


Method 6. Kaspersky Virus Removal Tool utility.
The method is based on the use of a script.
1. A computer and a disk (or flash drive) are required.
2. Download the Kaspersky Virus Removal Tool utility and write it to removable media.
3. Before booting the system, you need to select options for booting (to do this, press F8 at the very beginning of the process). Select the “Safe Mode with Command Line Support” option.
4. If everything goes well, the command line will appear after the system boots.
5. Insert the removable media into the computer.
6. Enter explorer on the command line and press enter.
7. The traditional “My Computer” should appear.
8. Go to the removable media menu and launch the Kaspersky Virus Removal Tool program.
9. In the application window, select the “Manual treatment” option and insert the codes below one by one. Important! One at a time - this means inserting the first script, clicking “Run”, deleting it, entering the second one, clicking “Run” and so on. The pictures are clickable and lead to the full text of these scripts.

begin

SearchRootkit(true, true);

QuarantineFile('Base.sys', 'CHQ=N');

QuarantineFile('explorer.ex', 'CHQ=N');

QuarantineFile('hpt3xx.sys', 'CHQ=N');

QuarantineFile('C:\WINDOWS\system32\DRIVERS\AVGIDS Shim.Sys', 'CHQ=S');

QuarantineFile('C:\WINDOWS\system32\drivers\cmudau .sys', 'CHQ=S');

QuarantineFile('C:\WINDOWS\System32\Drivers\dump_n vatabus.sys', 'CHQ=S');

QuarantineFile('C:\WINDOWS\system32\Drivers\SPT2Sp 50.sys', 'CHQ=S');

QuarantineFile('C:\WINDOWS\system32\Drivers\usbVM3 1b.sys', 'CHQ=S');

QuarantineFile('C:\WINDOWS\system32\DRIVERS\wg111v 2.sys', 'CHQ=S');

QuarantineFile('C:\DOCUME~1\FE66~1\LOCALS~1\Temp\Y KI224.tmp', 'CHQ=S');

BC_QrFile('C:\WINDOWS\System32\Drivers\dump_nvatab us.sys');

BC_QrFile('C:\WINDOWS\system32\Drivers\SPT2Sp50.sy s');

BC_QrFile('C:\WINDOWS\system32\Drivers\usbVM31b.sy s');

BC_QrFile('C:\WINDOWS\system32\DRIVERS\wg111v2.sys ');

BC_QrFile('C:\DOCUME~1\FE66~1\LOCALS~1\Temp\YKI224 .tmp');

BC_Activate;

RebootWindows(true);

end.


var
qfolder: string;
qname: string;
begin
qname := GetAVZDirectory + '..\Quarantine\quarantine.zip';
qfolder := ExtractFilePath(qname);
if (not DirectoryExists(qfolder)) then CreateDirectory(qfolder);
CreateQurantineArchive(qname);
ExecuteFile('explorer.exe', qfolder, 1, 0, false);
end.



begin
Executerepair(16);
ExecuteWizard('TSW', 2, 2, true);
RebootWindows(true);
end.



begin
ExecuteStdScr(3);
RebootWindows(true;
end.



10. After the reboot, see if the problem with the virus is resolved or not. If yes, then, by analogy with the previous methods, we check the computer with a regular antivirus.


Method 7. Hard case
Some modifications of the virus in question are very cunning. All previous methods are based on taking control of the computer into your own hands at the very beginning of booting and then carrying out operations - turning on safe mode, booting from removable media, etc. Variants of this virus can simply “block the road” - overwrite the boot sector so that it will now be impossible to somehow change the progress of the boot. Therefore the methods above will not work. But there is another way. About him below.

Insert the disk with the Windows operating system into the drive. Next, the same as in method 5: “you need to set the parameters so that when you turn on the computer, the system boots not from the hard drive, but from the CD. To perform this task, you need to go into the BIOS (at the very beginning of starting the computer, press the Delete key). Then we go to the Boot section (that is, downloading). A list of the order of media from which the system starts will appear there. By default this is the hard drive. We need to configure this parameter so that the first place is not the hard drive, but the disk located in the drive. We do this using the keyboard (the mouse does not work in the BIOS). The computer will now boot using the data from the disk."

After booting from removable media, instead of installing the system, press the R key. Then the recovery console will open. She will prompt you to choose which specific system to restore (use the 1 or Enter keys; answering the console question in the affirmative, you may need to press the Y and Enter keys). After that, enter the commands FIXBOOT and FIXMBR. Below in the pictures:

Виндовс заблокирован




We restart the computer and observe the result - the virus should disappear. True, he is unlikely to do this without leaving a trace. It often happens that problems with the operating system may subsequently arise, in particular, an empty desktop, a non-working task manager, etc. How to deal with this is below.


When safe mode does not turn on or LiveCD is powerless
Some varieties of the virus may prevent you from turning on safe mode, that is, the disease is active at the very initial stage of booting the computer. Or LiveCD does not help - it does not find the virus and, accordingly, cannot remove it.

In this case, an extraordinary move can help - solving the problem “backwards”, that is, first restore the interface, and then move on to deleting the banner itself. To do this, you need to use the recommendations given below - “Solving problems after removing the virus.” To begin with, you can somehow restore the system's functionality.

After carrying out operations, it is recommended to boot the system for the first time in safe mode, and not in normal mode, since the virus may be registered in startup and the banner may reappear.


Troubleshooting after virus removal
It is not always possible to simply remove a virus that requires sending an SMS or transferring money. The disease can change registry settings. Therefore, after uninstalling the virus, the desktop may be completely empty, and the mouse cursor may not work. Surely the task manager, Start menu, My Computer and other system functions will not open. You can try to carry out treatment from safe mode, but often it is not working, that is, the computer immediately reboots. But there is an opportunity to get out of the situation.

If the computer does not boot from the hard drive, you can do it from removable media, for example, from a CD. The Windows operating system has distribution kits with which you can immediately boot from disk.

Procedure for carrying out operations:
• Requires a computer and removable media (flash drive or disk).
• Find and download a boot disk image with the Windows PE OS distribution. It must either be added to the distribution disk, or written to a flash drive separately.
The archive does not contain any viruses. It contains various programs that allow you to work with system files and raise its performance “from its knees”. These include databases with antiviruses and editors. Naturally, your antivirus can play it safe and issue messages about an allegedly present threat.
• Inside, among other things, there is a program for recording SCD Writer (discussed in one of the previous methods). Select the “Disk” tab, there – “Burn ISO image”. Select the downloaded image, set the recording speed and wait for the process to complete.
• We go to the computer with the virus. You need to set the parameters so that when you turn on the computer, the system boots not from the hard drive, but from the CD. To perform this task, you need to go into the BIOS (at the very beginning of starting the computer, press the Delete key). Then we go to the Boot section (that is, downloading). A list of the order of media from which the system starts will appear there. By default this is the hard drive. We need to configure this parameter so that the first place is not the hard drive, but the disk located in the drive. We do this using the keyboard (the mouse does not work in the BIOS). The computer will now boot using the data from the disk.
• Insert the disk and flash drive with the registry editor.
• After booting from the disk, in the menu that opens, press the number 1 to enable WindowsPE. The system will begin to boot (possibly for a long time). Also point the program to the path to the infected operating system on the hard drive.
• Go to “My Computer” and open the flash memory there. We launch the registry editor on it. You may need to specify the location of the ntuser.dat file on the infected system to gain access to the registry. Puttakov: C:\DocumentsandSettings\account_name\ntuser.dat, where “account_name” means your Windows user name. If the program still does not see the file, go to “My Computer” and manually search for ntuser.dat in “Search”. Right-click on it, bringing up the context menu, and in “Attributes” uncheck “Hidden”. Now go back to the Registry Editor, the file should become visible. If the program prompts you to specify the path to the file for another user, refuse if you have completed all the operations above.
• There are two types of branches in the Registry Editor (on the left in the window are structures with folders). One is the current records for the system on disk, and the other is the infected system. They can be specified with brackets, say, HKEY_LOCAL_MACHINE(...), where (...), is the computer name or characters (W_IN_C). Perhaps only sub-branches will be duplicated, or the names of the registry entries of the infected system will be without brackets, with an underscore (HKEY_LOCAL_MACHINE_W_IN_C). You need to look around well to avoid making mistakes.
• We follow the path HKEY_LOCAL_MACHINE(...)\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon. Click on Winlogon, settings for this section will appear on the right. In the Shell line, instead of what is written there, set explorer.exe (to do this, click the mouse twice on the line). There is also a line called userinit. It should contain the path C:\WINDOWS\system32\userinit.exe (if your system is not recorded on the C:\ drive, specify a different logical drive). Important – the path must end with a comma! Look at other registry lines to see if there are any paths that do not lead into the system in any way.
• Next, go to “My Computer” and open the system folder: windows/system. There we find the file user32. If it exists, delete it. Then we check the logical drives (C, D and others that exist) and delete all autorun.inf files and those with the .exe extension from there. Then we turn on dr.web cureit and scan the affected system.
• We pull out the disk, reboot the computer, return to the BIOS, and return booting from the hard disk (HDD) there. Exit the BIOS menu and load Windows.
• After this, we scan the computer again with a regular antivirus. If the system does not work, try booting in safe mode.
If the task manager does not work, download avz and run the program. In the window, select “File”, there – “System Restore”. On the “Unlock task manager” item, check the box and click “Perform selected operations”. Close the application, the task manager should work. That's all. Be sure to write in the comments what didn’t work out.
December 11, 2013 25
Comment
Enter the code below:*
Click on the image to update the code if it is illegible
  1. Michael
    11 February 2014 04: 40
    Thanks for the useful information. We'll have to stake it out. Who knows?
  2. Natalia
    11 February 2014 07: 27
    The information is simply wonderful. I’ll definitely put it in a secluded place, “just in case,” and God forbid that I don’t use this information.
  3. Ivan
    12 February 2014 10: 59
    Thanks for the interesting material. I’ll try to use it when the opportunity arises, but the best way to treat it is not to get infected. You have to be careful when you visit indecent places and use “left” “Software” i.e. software. And where to get a license with our pension, this will be a wonderful topic for discussion.
  4. Victor
    13 February 2014 07: 10
    I already wrote, there is no need for all these troubles. Install the Shadow Defender PRG, there are also for 7 and 8 for 64 and 86. The essence of the program is that when it is turned on, you can test new PRGs, after a reboot the system is again like a newborn baby. The same thing with viruses, I rebooted and my head doesn’t hurt. I’ve been using it for 10 years, I forgot what viruses and other bullshit are.
  5. bobloss
    13 February 2014 08: 10
    Victor, it’s good that you trained yourself. But others don't want that. They are not used to bothering. Many people even live without antivirus
  6. Svetlana
    13 February 2014 09: 43
    Thank you very much!
  7. Yustas
    14 February 2014 08: 59
    When I had the Avast antivirus “free version,” problems arose regularly and I figured out the way to deal with it purely intuitively: the ransomware banner window pops up 1. Press WIN on the keyboard. The control panel opens. 2. Click reboot, the computer reboots and all the crap is scanned by the antivirus and deleted. After that, I just installed Avast internet sekuriti licensed, since March 1 last year I haven’t seen a single banner again, it blocks everything stably, and I recommend installing an ad and pop-up blocker, it costs 350 rubles. Advertising and banners are not visible at close range, sometimes it gets boring!!!
  8. Vladimir
    Vladimir
    16 February 2014 17: 11
    Thank you very much!
  9. Delovoy
    18 February 2014 17: 36
    I see that some people have perked up, there are even two women among them, I doubt that they are watching this, although...
    In your article, you mentioned that such a banner also blocks booting in safe mode, but you avoided the question of whether it blocks booting in safe mode with command line support.
    I myself, after sitting at the computer for a couple of months, encountered similar ransomware. They asked for 600 rubles, but I picked up the computer and took it to the service center. I paid 400 rubles, smoked on the street for 40 minutes and took a healthy computer.
    Of course, now I am not in danger of such a misfortune, there are several reasons for this: today I have two OS installed (there were five) on one computer, by loading the second OS I can clean out the blocked one; By logging into safe mode with command support, I can manually clean the computer.
    Namely, for novice users, I doubt that the scripts will be useful, that they will be too tough.
    Good luck.
  10. bobloss
    18 February 2014 17: 44
    Delovoy, it won’t hurt for novice users, I think. Several ways are better than one.
  11. Delovoy
    18 February 2014 19: 21
    Yes, I agree that it won't hurt. And the article is very useful. But it’s not exactly for novice users. A beginner will not be able to cope with all this, but if he can cope, he can safely exclude himself from the ranks of beginners. And I didn’t understand how to take a screenshot on a locked system. Of course, you can take a photo with a camera or phone.
    I myself publish on two sites on similar topics, so don’t think that I just wanted to find fault with you. I've met some freaks who find fault with authors' spelling errors.
  12. bobloss
    18 February 2014 19: 32
    Beginner users, of course, will not understand most of the examples given. But for example, I think they will master the first one (introducing the code). The problem is that removing a banner is not an easy task, so the methods are also complicated. What sites do you write on, yours or others?
  13. Delovoy
    18 February 2014 21: 21
    I publish on other people’s sites, now on two, on one some articles and videos on my behalf, on the other on behalf of the site administrator. Previously published simultaneously on four sites. Published on "My Computer Plus" under my own name (the same name as here in the comments).
    There was a desire to make my own website, but... Then I wouldn’t have time to write well. In principle, I’m still an admin on one website, but I hardly work on it, there’s a forum, I go there once a week to remove other people’s advertisements.
  14. Maksim
    April 17 2014 10: 59
    Nothing works, there is no other computer to burn the image
  15. Sergei
    April 17 2014 11: 03
    Maxim, have you tried all the methods? Most likely, you cannot do without an image in this case.
  16. Sergei
    31 May 2014 18: 45
    I wrote a universal instruction http://faninc.ru/publ/windows_zablokirovana_otpravte_sms_universalnoe_reshenie/
    3
    2-1-0-10
  17. bobloss
    31 May 2014 20: 11
    Sergey, your universal instructions do not work in most cases, no matter how much you would like them to. And it is far from a fact that the recovery option is enabled on the computer and there are checkpoints.
  18. Alexey
    13 June 2014 15: 44
    I advise everyone else who finds themselves in this situation to install Adguard in the future. It removes advertising and prevents various banners from getting onto your computer.
    Link: http://download.adguard.com/d/20081/adguardInstaller.exe
  19. bobloss
    13 June 2014 16: 04
    Alexey, thanks for the link.
  20. Vadim
    18 September 2014 15: 58
    Hello.
    To avoid getting into such situations in the future, we install the excellent program “Adguard”.
    How will she help?

    - Blocks banners. (will not get to your computer)
    - Blocks advertising.
    - Saves traffic.

    Download: http://download.adguard.com/d/21292/adguardInstaller.exe

    Good luck!
  21. Nastya
    Nastya
    18 November 2023 15: 37
    Good help for removing banners from your computer
  22. Just4tw
    Just4tw
    21 November 2023 12: 02
    This is one of the most useful articles I have read. Indeed, many people are tired of this virus. 
  23. Shaty
    Shaty
    1 December 2023 13: 35
    But earlier there were rumors that such viruses were the end of Windows, that’s all, you had to reinstall it. How narrow-minded we were)
  24. YanRing
    YanRing
    3 December 2023 22: 58
    This is very useful information, I will definitely save this article for myself. If necessary, I can always use it to remove the problem if “Windows is blocked.” 
  25. Tulip
    Tulip
    4 December 2023 11: 55
    Guys, you are cool, the article is fire, at work we were able to remove the banner with the virus based on this article.