This page aims to help you remove Locked Virus. These Locked Virus removal instructions work for all versions of Windows. We’ve additionally seen this threat referred to as “locky virus”, “locky ransomware” and there have been people asking for how to recover their “locky datei.”
It today’s article I will try to help people deal with Locked Virus. This is a nasty virus from the ransomware family that specializes in data encryption and money extortion. These virus have a fearsome (and well deserved) reputation for one simple fact – files encrypted by them will not get reverted even if you remove the virus and decrypting the files without access to the encryption key is next to impossible. There are some alternative tricks that you can attempt to recover your files and I will cover them in more details in the removal guide, but the goal of this article is to teach you a few basic things about ransomware so that you know how to defeat Locked Virus.
Locked Virus is not at all different from ransomware viruses in circulation
Of course, there are no two viruses that are completely alike, but many of the differences will remain hidden on the technical level – such as what type of encryption is used, is the ransom demanded after or while files get encrypted etc, etc.
What you need to know is that all ransomware viruses try to remain hidden after they infect your computer. They’ll use this time to encrypt your files. This process can be detected if you pay attention – if you see that some of your files end with a new file extension and your computer is running very poorly then these are surely caused by a hidden ransomware process. If you manage to catch Locked Virus before it has all of your files encrypted, you can search for the virus process with the help of the task manager and shut it from there. You’ll recognize it by the huge amount of CPU power it uses – probably over 90%.
If all of your files have already been encrypted you have a bigger problem, as removing the virus will not restore them.
- WARNING! Changing the file extensions of encrypted files will not restore them, but it will make them unusable if you actually decide to pay the ransom. Leave all encrypted files alone – they are not threatening your PC in any way.
What you can try to do is recover your original files before they were encrypted. The ransomware does not actually transform your files, it merely creates the encrypted copies and then deletes the originals. If you are lucky and had a restore point set up this might save your files. Alternatively, there is a program used to recover deleted which may do the same. The detailed instruction on how to do both are in our removal guide below.
How was your PC infected by Locked Virus?
It could have happened either directly, or indirectly via the help of another virus.
The ransomware is known to directly attack computers by hiding into corrupted executable and archive files, which in turn can be downloaded from spam emails, torrent files and online storage platforms. Alternatively, a Trojan horse virus could have been used – these can be hard to detect for many anti-virus programs and they can hide in many kinds of innocent looking files or links. Malicious websites and links could be used to trigger the Trojan, which will target a system vulnerability and gain access to your computer. It will then serve as a backdoor for the ransomware and allow it to install itself unannounced and completely invisible. We strongly recommend that you search your computer for any possible Trojan infection, otherwise you run the risk of having new ransomware installed at some point in the future.
Please note that while they are many anti-virus and anti-malware programs on the market not all of them are up to the task of stopping the newest Trojans and ransomware viruses .If you are looking for a recommendation on this type of software please click on one of the banners above – this program can scan your computer for free and from there you can decide if you really need it or not.
|Danger Level||High (This is one of the most dangerous viruses of all)|
|Symptoms||All user files encrypted, ransom demanded in utnracable BitCoin currency.|
|Distribution Method||Malicious links, websites, spam emails, Trojan horse dropped viruses.|
|Detection Tool||Malware and Adware are notoriously difficult to track down, since they actively try to deceive you. Use this professional parasite scanner to make sure you find all files related to the infection.Sponsored|
Remove Locked Virus
Readers are interested in:
Reboot in Safe Mode (use this guide if you don’t know how to do it).
This is the first preparation.
The first thing you must do is Reveal All Hidden Files and Folders.
- Do not skip this. Locked Virus may have hidden some of its files.
Hold the Start Key and R – copy + paste the following and click OK:
A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:
If there are suspicious IPs below “Localhost” – write to us in the comments.
Type msconfig in the search field and hit enter. A window will pop-up:
Go in Startup —> Uncheck entries that have “Unknown” as Manufacturer.
Press CTRL + SHIFT + ESC simultaneously. Go to the Processes Tab. Try to determine which ones are a virus. Google them or ask us in the comments.
WARNING! READ CAREFULLY BEFORE PROCEEDING!
Right click on each of the virus processes separately and select Open File Location. End the process after you open the folder, then delete the directories you were sent to.
Type Regedit in the windows search field and press Enter. Once inside, press CTRL and F together and type the virus’s Name.
Search for the ransomware in your registries and delete the entries. Be extremely careful – you can damage your system if you make a big mistake.
Type each of the following in the Windows Search Field:
Delete everything in Temp. The rest just check our for anything recently added. Remember to leave us a comment if you run into any trouble!
How to Decrypt files infected with Locked Virus
There is only one known way to remove this virus successfully – reversing your files to a time when they were not infected. There are two options you have for this:
The first is a full system restore. To do this type System Restore in the windows search field and choose a restore point. Click Next until done.
Your second option is a program called Recuva
Go to the official site for Recuva and download it from there – the free version has everything you currently need.
When you start the program select the files types you want to recover. You probably want all files.
Next select the location. You probably want Recuva to scan all locations.
Now click on the box to enable Deep Scan. The program will now start working and it may take a really long time to finish – maybe even several hours if your HDD is really big, so be patient and take a break if necessary.
You will now get a big list of files to pick from. Select all relevant files you need and click Recover.
Did we help? Found an alternative solution? Share your feedback with us so we can help other people in need!