malwarebytes banner

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to fix Windows 10 error 0xc00000e9

0
The 0xc00000e9 code is a BSOD (Blue Screen of Death) error frequently-seen on Windows 10. The issue results in an unexpected shutdown with a recovery screen displaying: "There was a problem with a device connected to your PC. An unexpected I/O error has occurred. Error code: 0xc00000e9". The window also says the possible reason for the error appearance lies in the wrong connection of external devices. This is the truth, especially when it was abruptly removed from the input port. Whenever Windows 10 suspects a risk of damage, it shuts down your PC to prevent unhealthy conditions. However, if you keep running into the same problem multiple times, this may cause future damage to your devices. If you are sure there are no accidental manipulations done from your side, more likely there are some independent problems like wrong configuration, hard drive problems, lack of drivers, an unstable connection of plugged devices, missing or corrupted files. Below, we have gathered a list of the most popular and effective solutions to stop the 0xc00000e9 error.

How to fix Windows 10 Update error 0x80080008

0
The 0x80080008 error code is related to windows updates. A number of people reported the problem appears after trying to check for updates. Some users managed to find a temporary solution using Windows Troubleshooter, however, the problem continued to press the line after a simple reboot stating the "Service registration is missing or corrupt" message. As a result of error inspection, experts found the reason behind 0x80080008 appearance is in Wups2.dll (the file included in the latest version of Windows Update) that was incorrectly installed. Apart from the prime reason we mentioned, there are grounds to believe that 0x80080008 may be related to the scarcity of files, wrong service configuration, and so forth. Below, we will show how to get rid of this annoying problem and continue receiving Windows Updates as usual.

How to remove Ziggy Ransomware and decrypt .ziggy or .optimus files

0
Ziggy is a new ransomware-infection recorded in December 2020. The virus sneaks into your system disabling all protectionary layers on your PC. Then, it gets the job done by running data encryption with AES256-GCM and RSA-4096 algorithms. These ensure strong encryption, which is hard to decipher. Before going deeper into details, it is important to say that there are two versions of Ziggy Ransomware. The first uses the .ziggy extension along with victims' ID and cybercriminals' e-mail to configure the data. The later version of Ziggy Ransomware detected recently started involving the same string of information but changed the extension at the end to .optimus. For example, a file like 1.docx would change to 1.docx.id=[88F54427].email=[khomeyni@yahooweb.co].ziggy or 1.docx.id[B68A285D].[sikbeker@tuta.io].optimus depending on which version affected your PC. Following successful encryption, the malicious program creates a text file containing decryption instructions. The name of the files can vary from version to version, so there is no commonly-used, but initially, it was called ## HOW TO DECRYPT ##.exe.

How to remove Enfp Ransomware and decrypt .enfp files

0
Being part of the DJVU/STOP family, Enfp is a new ransomware infection targeting data encryption. Just like other malware of this type, Enfp appends its own .enfp extension to encrypted files. To illustrate, an innocent file like 1.mp4 will change to 1.mp4.enfp, and similarly with other files. Developers of ransomware infections pursue monetary benefit - this is why there are providing paid instructions to decrypt your data. This information can be found in a text note (_readme.txt) created in each folder with the encrypted files. Inside of it, developers give a condensed summary of what happened to your PC. It is said that all of your pictures, databases, documents, and other valuable data were encrypted with strong algorithms, but can be returned. To do this, victims should purchase the decryption tool along with a unique key held by cybercriminals. The original price equals 980$, however, it can be decreased by 50% if you contact swindlers during the first 72 hours. Before doing so, you can also get a video overview of the decryption tool and send 1 random file (that does not contain valuable intel) to test whether developers can decrypt your files for free. Unfortunately, there is no guaranteed way to decrypt files without the involvement of cybercriminals themselves.

How to remove Ekvf Ransomware and decrypt .ekvf files

0
One of the main computer threats today is ransomware. Those are devastating computer viruses, that encrypt user's files using various cryptographic algorithms and extort ransom money for the decryption key. It is especially sensitive for users, as it attacks either personal files such as videos, photos, music, or business data such as MS Office file formats, e-mails, databases. Such files can be crucial for business operation or extremely important personally as part of family memory. Malefactors can demand from several hundred to several thousand dollars as a ransom. STOP Ransomware is officially the most wide-spread and therefore most dangerous ransomware threat. There've been more, than 230 versions of this virus in 3 years. Each variation infects thousands of computers, and there are millions of victims of this nasty malware. In this article, we will explain typical methods to fight Ekvf Ransomware and decrypt affected files. In today's focus, versions of STOP (DJVU), that add .ekvf extensions. Recent samples use a very similar pattern to infiltrate PCs and encrypt files. After encryption ransomware creates file (ransom note), called _readme.txt.

How to remove Matroska Ransomware and decrypt .happyness or .siliconegun@tutanota.com files

0
Matroska Ransomware is a malicious piece aimed at data encryption. Matroska used to show its activity a couple of years ago until it went dormant. Within some time, it started a series of new infections on users' PCs. Whilst older examples of Matroska applied the .HUSTONWEHAVEAPROBLEM@KEEMAIL.ME, .happyness, .encrypted[Payfordecrypt@protonmail.com], .nefartanulo@protonmail.com extensions to encrypted files, recent attacks of this ransomware showed the new .siliconegun@tutanota.com extension being involved. Depending on which version impacted your system, a file like 1.mp4 will change to 1.mp4.happyness or 1.mp4.siliconegun@tutanota.com at the end of encryption. Once this process is finished, the virus goes further and creates a text file (HOW_TO_RECOVER_ENCRYPTED_FILES) with decryption instructions. Alike other ransomware infections, Matroska asks victims to pay a fee. The amount may vary from person to person, however, we do not recommend buying their software. Luckily, experts found that Dr.Web (leading antimalware software) is able to decrypt your data legitimately and risk-free. Before doing so, you've got to make sure you deleted Matroska Ransomware from your computer. Only then you can use third-party tools to recover the data. For more information on both removal and data decryption, follow the article down below.