This computer is configured to require a password in order to start up windows 10

*
This overview covers how to actually resolve the “This computer system is configured to need a password in order to start up” error that has actually been popping up on many type of XP makers. This process just takes a couple of minutes for an expert user however could take some extra time for incompetent individuals. Interestingly this procedure additionally works for many kind of other purposes such as restoring the Windows regisattempt after corruption once a drive has actually bad sectors.

You watching: This computer is configured to require a password in order to start up windows 10

From what we’ve watched this appears to be concerned a virus that permits SAM (regisattempt file) encryption. As such, using typical password transforming devices such as NT PWD Recollection wont deal with this worry. What we must carry out is to restore the regisattempt documents to their pre-infected state. Even many type of experienced users aren’t conscious that Windows XP stores practically everyday registry backups surprise in a folder on the root of the drive called “System Volume Information”.

Obviously you can’t boot this computer from the difficult drive bereason of the password, so you’ll either have to boot from a live CD or rerelocate the difficult drive and also affix it to an additional PC. Once you have actually access to the Hard Drive go right into the “System Volume Information” folder. If you get access denied errors you may must take ownership of the folder first. You have the right to google “Take ownership” for plenty of guides on that step.

*

Once in the folder you will certainly view another folder referred to as “_restore…” followed by a bunch of gibberish, open up that folder. 

*

Once inside you will view a list of folders, these contain regisattempt backups and also device reclaim data, kind by date to watch what date ranges are obtainable for recoexceptionally. Typically I pick a date about a week before the occurrence occurred just to be safe.

See more: Free Clone 1Tb Hdd To 500Gb Ssd Without Reinstalling? How To Clone A 1Tb Hdd To A 500Gb Ssd On A Laptop

*

Once you pick a day to reclaim from, enter that folder and also it will certainly look choose this… we desire to open up the snapshot folder

*
Althe majority of done, You will certainly now see 4 records which are copies of the Windows registry from the day you selected. The 5 registry records we are interested in are highlighted however must be recalled before they have the right to be recovered to the Windows catalog.

*

I developed a custom batch file to execute all of this job-related for me automatically which is at the bottom of this post but for simplicity you have the right to rename the highlighted documents by ssuggest best clicking and renaming:

Rename “_REGISTRY_USER_.DEFAULT” to “default”Rename “_REGISTRY_MACHINE_SECURITY” to “security”Rename “_REGISTRY_MACHINE_SOFTWARE” to “software”Rename “_REGISTRY_MACHINE_SYSTEM” to “system”Rename “_REGISTRY_MACHINE_SAM” to “sam”

Now pick those 5 papers you simply developed (default, security, software application, mechanism, sam) and paste them into the “Windowssystem32config” folder and overwrite the existing files.

You have actually currently brought back your Windows registry to the date you selected. As lengthy as the day you selected was before the infection Windows must boot commonly. If you still check out the password prompt and also need to go ago to a further day you can simply repeat this procedure and choose an older date.

See more: System And Compressed Memory High Disk Usage, On Windows 10

Here is a batch file to automate the process, ssuggest run it from within the snapswarm folder. It assumes the tough drive is plugged into a test bench and also is the “d” drive, you have the right to modify the drive letter for whatever drive yours is.


echo offEcho copy regisattempt batch fileecho.echo location this batch file right into the device volume indevelopment directory you desire to useecho.copy _REGISTRY_USER_.DEFAULT defaultcopy _REGISTRY_MACHINE_SECURITY securitycopy _REGISTRY_MACHINE_SOFTWARE softwarecopy _REGISTRY_MACHINE_SYSTEM systemcopy _REGISTRY_MACHINE_SAM samecho.ren d:windowssystem32configsystem system.oldren d:windowssystem32configsoftware application software program.oldren d:windowssystem32configsam sam.oldren d:windowssystem32configdefense defense.oldren d:windowssystem32configdefault default.oldecho.echo.copy default d:windowssystem32configdefaultcopy protection d:windowssystem32configsecuritycopy software program d:windowssystem32configsoftwarecopy mechanism d:windowssystem32configsystemcopy sam d:windowssystem32configsamecho.echo Done