malwarebytes banner

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to fix Modern Setup Host (SetupHost.exe) High CPU and Disk Usage

0
Also known as SetupHost.exe, Modern Setup Host is an important Windows component that is responsible for the proper installation of updates. Whenever users upgrade their system, Modern Setup Host launches in the background mode to finish the update. The component can work in active mode for up to 4 hours depending on the size of installing updates. It is normal to see Modern Setup Host allocated with most resources in Task Manager whilst updating your system. Unfortunately, during its vital activity, some users experience severe drops in system performance due to excessively high resource usage. CPU, Disk, or even Memory can be overloaded to 100% resulting in freezes and system crashes eventually. This, therefore, prevents users from installing updates correctly. Sometimes it may be hard to detect the issue unless you know the most common origins of it. As a rule, the main reasons that cause SetupHost.exe to soar up in resource consumption are low hard drive capacity, the presence of malware, corruption, and incompatibility issues. To make sure the problem is solved, follow our tutorial down below.

How to remove Haron Ransomware and decrypt .chaddad files

0
Haron is one of many ransomware infections that target encryption of personal data to demand paying the so-called ransom. Such malware makes sure most of the data stored on your device is locked out from regular access. Put differently, users affected by ransomware are no longer permitted to access the files. To learn if they have been encrypted, it is enough to look at their appearance. Haron adds the .chaddad extension to each of the files and forces the reset of icons as well. For example, a file named 1.pdf will be changed to 1.pdf.chaddad and drop its icon to blank. After this part of infection gets to a close, victims receive two notes (RESTORE_FILES_INFO.txt and RESTORE_FILES_INFO.hta) with decryption instructions. These instructions are meant to inform users about encryption. In addition to that, they claim cybercriminals to be the only figures able to recover your data. For this, users are asked to purchase unique decryption software held by extortionists themselves. Victims have to access a link via the Tor browser to complete the required payment. Sometimes frauds forget to put the contact or payment links, which makes recovery via cybercriminals automatically impossible.

How to remove Pay Us Ransomware and decrypt .pay us files

0
Pay Us Ransomware seems to be a by-product of Vn_os Ransomware, which we discussed on our blog already. It acts exactly the same way - running data encryption and pushing victims to pay a so-called ransom. The only difference stands for different names of extensions and notes. Pay Us appends the .pay us extension to each file encrypted. To illustrate, a file like 1.pdf will be changed to 1.pdf.pay us and reset its original icon after encryption. Then, once this process gets to a close, the virus springs into creating a text note (read_me.txt) that contains decryption instructions. As developers state, victims are having the only option to recover the data - that is to pay for decryption tools sold by the extortionists. The price for decryption is set at 1,500$ to be paid in BTC. The Bitcoin rate differs constantly, this is why the price tag can soar up any time in the future. It is quite uncertain how victims will be getting the promised tool after sending the money. There are no e-mail addresses attached for establishing contact with the fraudulent figures. Considering this, obtaining decryption instruments from cybercriminals is full of uncertainty. Therefore, we do not recommend you to do so as there is a risk to lose your money.

How to remove AvosLocker Ransomware and decrypt .avos files

0
AvosLocker is one of the most recent ransomware infections that encrypt personal files using both AES-256 and RSA-2048 algorithms. Along with this, the virus adds new .avos extension to each file that got encrypted. To illustrate, a sample file like 1.pdf will change to 1.pdf.avos and reset its original icon at the end of encryption. After all files have been configured with the new extension, users will see a text note called GET_YOUR_FILES_BACK.txt explaining how to recover the data. To do this, victims are instructed to visit the onion link via Tor browser, enter their personal ID, and therefore get the price for decryption suite to return their data. For now, this looks to be the only option available to recover your data completely. There is no third-party tool that has been successfully tested in decrypting AvosLocker files. It is worth noting that paying the monetary ransom may bear the risk of losing your money as well. This is why the best-case scenario in this situation is using backup copies of data.

How to fix WaasMedic.exe High CPU and Disk Usage

0
In essence, WaasMedic.exe or WaasMedic Agent is an important Update component that runs as a background service on Windows 10. It was first added in the 10th edition of Windows to manage the flawless installation of updates. Specifically, to ensure all update-related components remain healthy and undamaged. Whenever Windows faces an update struggle, Waas.Medic.exe ends up being involved in resolving potential issues. Unfortunately, some users have complained that there is exhaustingly high usage (up to 100%) of system resources when WaasMedic.exe is on. This can be caused by various reasons. For example, WaasMedic.exe may conflict with external devices (Hard drive or USB drive) as they are connected to your computer. In other cases, the culprit can be third-party or anti-malware software that forces WaasMedic.exe to run into compatibility issues. Whatever the case, it is not going to disappear itself. Unless you run the solution, the WaaSMedicSVC service is likely to continue slowing down your system due to high CPU, Disk, or Memory usage. To fix this issue, follow a list of solutions presented in our instructions below.

How to remove Gru Ransomware and decrypt .gru files

0
Gru Ransomware blocks access to personal data to earn money on demanding a so-called ransom. Such malware runs file encryption with strong algorithms that prevent users from approaching free decryption. The virus adds the .gru extension to each encrypted file. To illustrate, 1.pdf or any other similar file will change to 1.pdf.gru and reset its original icon. Such changes will be applied to most types of data stored on your system. To regain access to your data, victims are asked to follow instructions outlined inside of the read_it.txt text note, which is created after encryption. Cybercriminals state there is no way to decipher your data without buying special software. The price of such software is established at 1,500$ to be paid in BTC. The payment address can be found at the very bottom of the text note. Unlike other ransomware programs, Gru developers do not ask their victims to establish any sort of contact with them (by e-mail or Tor link). Therefore, It is uncertain how are they going to send you the decryption software once you deliver the money. Thus, trusting Gru Ransomware in terms of paying the ransom is quite a huge risk. Even though its developers might be the only figures able to decrypt your entire data, we recommend against sending your money.

How to remove the Vn_os Ransomware and decrypt .vn_os files

0
Vn_os is a ransomware-type virus that encrypts personal data to demand money in exchange for the blocked files. Such virus type also assigns new file extensions. Vn_os makes sure all encrypted files are changed with the .vn_os extension. This is meant to visually separate encrypted from original files. For instance, 1.pdf and other files stored on your system will be changed to 1.pdf.vn_os, or similarly, right after encryption. As soon as this stage of infection is done, the virus displays a pop-up window with instructions on how to recover your data. The same can also be found inside of a text note called ___RECOVER__FILES__.vn_os.txt which is dropped into each folder containing infected data.

How to run 32-bit apps and games on Mac OS Big Sur and M1...

0
The world of Mac evolves rapidly bringing new features as well as leaving some of them behind. The time Apple released Catalina OS, users had to accept the drop of support for 32-bit apps. The same trend continued with Mac devices based on the latest Big Sur and M1 Processors. Although this change is part of technological development and meant to boost future system performance, a trace of frustration is felt by some of the users. With this update, some old applications and games can no longer be used in newer versions. Users are faced with a message saying "The developer of this apps needs to update it to work with this version of macOS" or "The App is not optimized for your Mac and needs to be updated". The most popular 32-bit programs still preferred by some users are Microsoft Office 2011, MetaTrader, Adobe CS5/CS6, Aperture. The same issue impacted some plugins for music production software which are 32-bit only. Also, if you attempt to launch an old game from the Steam library, you will be said that your current macOS is unable to run 32-bit games. There are not many options to solve this problem, however, if you are stubborn enough, you can revive 32-bit apps and games on later versions of Mac. Explore some of the methods in the article below.