malwarebytes banner

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to remove Koom Ransomware and decrypt .koom files

0
Koom Ransomware (subtype of STOP Ransomware) continues its malicious activity in December, 2020, and now adding .koom extensions to encrypted files. The malware aims most important and valuable files: photos, documents, databases, videos, archives and encrypts them using AES-256 algorithms. Encrypted files become unusable and cybercriminals start extorting ransom. If the hacker server is unavailable (the PC is not connected to the Internet, the server itself does not work), then the encrypter uses the key and identifier that is hard-coded in it and performs offline encryption. In this case, it will be possible to decrypt the files without paying the ransom. Koom Ransomware creates _readme.txt file, that is called "ransom note", on the desktop and in the folders with encrypted files. Developers use following e-mails for contact: manager@mailtemp.ch and managerhelper@airmail.cc. Hackers demand $980 for the decryption of your files (the message states, that victims will get a 50% discount if they'll contact cybercriminals within 72 hours after the encryption). According to many reports, malefactors often don't reply to victims, when they receive ransom payment. We strongly do not recommend paying any money. Files encrypted by some versions of Koom Ransomware can be decrypted with help of STOP Djvu Decryptor. Dr.Web specialists decrypted files encrypted with some variants of Koom Ransomware in private. Dr.Web does not have a public decoder. Before trying to decode the files, you need to stop the active process and remove Koom Ransomware.

How to fix Windows Update error 0x80070424

0
0x80070424 has been an update error spanning its roots from Windows XP to these days. Like many, the error pops whilst trying to install new updates with the following message: "There were some problems installing updates, but we'll try again later. If you keep seeing this and want to search the web or contact support for information, this may help: (0x80070424)". This is where it ends with no real solution proposed by Microsoft. Luckily, further discussion on forums and troubleshooting blogs helped users form a list of solutions that can address the 0x80070424 code. As a rule, such errors occur because some files are missing or corrupted, there is a damaged or disabled configuration for some services, and third-party software causing a conflict. It is only possible to suspect which one of these reasons affects your case of occurrence. This is why you should try each available solution until the issue ends up resolved. You can find the list of them in our tutorial below.

How to remove BlackByte Ransomware and decrypt .blackbyte files

0
BlackByte is the name of a data-locker that encrypts files stored on a device. Such malware is more known as ransomware because it extorts money from victims for the recovery of data. Even though BlackByte is new and little observed, there are enough details to differ it from other infections. One of them is the .blackbyte extension that is appended to each encrypted file. For instance, a piece like 1.pdf will change its extension to 1.pdf.blackbyte and reset the original icon. The next step after encrypting all available data is ransom note creation. BlackByte generates the BlackByte_restoremyfiles.hta file, which displays recovery details. Within, victims are instructed to contact cyber criminals by e-mail. This action is mandatory to receive further instructions on how to purchase a file decryptor. This decryptor is unique and held only by cybercriminals. The price of ransom can vary from person to person reaching hundreds of dollars. Keep in mind that paying the ransom is always a risk to lose your money for nothing. Many extortionists tend to fool their victims and not send any decryption instruments even after receiving the requested money. Unfortunately, there are no third-party decryptors that can guarantee 100% decryption of BlackByte files.

How to fix Windows Update error 0x8007045b

0
Update issues are no revelation to the Windows world. They tend to appear from time to time whilst installing new builds, patches, and other kinds of updates. Some users reported the 0x8007045b error arrives when attempting to upgrade their system to the next Windows build available (Windows 10 Insider Preview 14379). Even though this is the most discussed case of updating, other builds and minor updates may lead to similar issues as well. Mostly all update errors share the same source of causes that make them arise - corrupted files, wrong configuration of services, third-party interference, and other closely related reasons. To solve them, we recommend you to take your time through this set of solutions below. Follow each step precisely to avoid missing anything of the essence.

How to remove Ranion Ransomware and decrypt .ransom or .r44s files

0
Ranion is a malware group that develops and spreads ransomware infections. Its recent version is called R44s, which encrypts data using strong cryptographic algorithms and then demands money for its redemption. Victims can spot their files have been encrypted by visual means. First versions of Ranion Ransomware discovered in Novemver, 2017 used .ransom extension. Now the virus assigns the plain .r44s extension to all compromised pieces. Here is a quick example of how files will look after successful encryption - 1.pdf.r44s, 1.jpg.r44s, 1.xls.r44s, and so forth depending on the original file name. Right after this encryption process ends, R44s creates an HTML file named README_TO_DECRYPT_FILES.html.

How to remove Artemis Ransomware and decrypt .artemis, .ultimate or .999 files

0
Discovered by a malware researcher named S!Ri, Artemis belongs to the PewPew ransomware family. Frauds behind this family have spread a number of high-risk infections that run data encryption. Artemis is the most recent variant of file-encryptor that cuts access to most stored data using multi-layer cryptographic algorithms. These algorithms make data thoroughly encrypted, which disables users from opening them. Besides that, encrypted files locked off by Artemis get changed in visual means as well. For instance, a file like 1.pdf will change to something like 1.pdf.id-victim's_ID.[khalate@tutanota.com].artemis and reset its original icon. This string consists of the victims' ID, khalate@tutanota.com email address, and .artemis extension at the end. Then, as soon as encryption gets to a close, Artemis prompts the info-decrypt.hta to appear across the entire screen. Recent versions of the malware use ReadMe-[victim's_ID].txt ransom note name and use .ultimate and .999 extensions (1.pdf.id[victim's_ID].[UltimateHelp@techmail.info].ultimate and 1.pdf.id[victim's_ID].[restoredisscus@gmail.com].999).