iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to remove CryWiper Ransomware and decrypt .CRY files

0
CryWiper is a devastating virus that damages the configuration of data to make it inaccessible and then demands money from victims for fake decryption. CryWiper developers disguise their software as ransomware that encrypts data, however, it is in fact a data wiper that simply corrupts the files. While running "encryption", the virus deletes all shadow copies from the root drive and appends the new .CRY extension to highlight the files. For instance, a file originally named 1.pdf will turn into 1.pdf.CRY and become permanently damaged. After this, CryWiper creates a file called README.txt with misleading decryption instructions. It is known that CryWiper avoids damaging .exe, .dll, .lnk, .msi, and .sys files and others stored in Boot, System, and Windows directories. In addition, this virus has also been observed getting distributed via the browserupdate.exe malicious file, programmed in C++ language, and targetting organizations that are localized in Russia.

How to fix “DLLRegisterServer Was Not Found” error on Windows 11/10

0
DLLRegisterServer Was Not Found is a message error that makes its presence known when users are trying to manually register a DLL (Dynamic Link Library) or OCX (OLE Control EXtension) file via Command Prompt. It has also been reported to occur on both Windows 10 and 11. While there is no single reason that drives users to see this error, it can be related to a lack of certain permissions in registry keys, corrupted/missing system file elements, problematic DLL files, or even incompatibilities caused by the side of third-party software (such as antivirus). Trying to find the exact reason and solution immediately is like a shot in the dark, so we advise you to try each method we wrote down below until the issue gets resolved eventually. The instructions are almost the same on both Windows 10 and 11 operating systems.

How to remove Beijing Ransomware and decrypt .beijing files

0
Beijing is a ransomware-classified infection that encrypts access to data and demands that victims pay money for its decryption. This file encryptor is also likely released by the same cybercriminals who previously developed another ransomware named LeakTheMall. During encryption, victims will see their files change visually - it is the new .beijing that will be eventually added to them. For instance, an originally named 1.pdf will change to 1.pdf.beijing and become no longer accessible. After this, the virus creates text instructions in !RECOVER.txt explaining what should be done to recover the data.

How to remove Trigona Ransomware and decrypt ._locked files

0
Trigona is the name of a ransomware virus that encrypts data of corporate users (e.g., companies) and demands money for file decryption. During encryption, it appends the new ._locked extension (for instance, 1.pdf._locked) and creates a file named how_to_decrypt.hta after successful completion. This file contains instructions with steps on what victims should do to decrypt their data. It is said all critical information, such as documents, databases, local backups, and so forth has been encrypted and leaked. Cybercriminals also mention that file decryption is impossible without their direct involvement. Also, it is mentioned that data of those who refuse to collaborate with cybercriminals will be sold to figures potentially interested in its abuse. To prevent all of this, threat actors guide victims to open a decryption page via the TOR Browser and contact the ransomware developers.

How to remove Bazek Ransomware and decrypt .bazek files

0
Bazek is a virus infection that features all the traits inherent to ransomware. Put simply, it encrypts access to data (using AES-256 algorithms) and asks victims to contact cybercriminals in order to get a special decryption key. During encryption, the virus also assigns the new .bazek extension to each targeted file. To illustrate, a file named 1.pdf will change to 1.pdf.bazek and lose its original icon as well. Depending on what version of Bazek Ransomware attacked the computer, it will either create a text note called README.txt or display a pop-up window with similar decryption instructions.

How to remove RansomBoggs Ransomware and decrypt .chsch files

0
Also known as Sullivan, RansomBoggs is a ransomware infection designed to encrypt data and demand payment for decryption afterwards. Recent research showed that this virus has had numerous attacks on various organizations placed in Ukraine. During encryption, RansomBoggs renames all targeted files with the .chsch extension. For example, a file originally titled as 1.pdf will change to 1.pdf.chsch and become no longer accessible. Following this, the ransomware also creates its own note (SullivanDecryptsYourFiles.txt) with decryption instructions.

How to turn off notifications from websites

0
Almost every popular browser can brag about the inbuilt push notifications feature that allows users to subscribe to notifications from various websites such as news portals and receive them right on the desktop. This way, users can get a faster and more convenient experience by staying aware of the latest updates from the desired webpage. In some cases, however, inexperienced users may become victims of dubious pages that promote unwanted or malicious ads by tricking users into allowing their push notifications. Such pages often display fake messages similar to "Press Allow to verify that you are not a robot", "Download is ready. Click Allow to download your file", and so forth. After allowing push notifications from such websites, the user's desktop will start being continuously bombarded by unwanted notifications that promote redirects to suspicious/malicious pages. No matter which type of website you've eventually subscribed to, read our guide below to turn off normal and also potentially malicious push notifications if that is the case.

How to remove SEX3 Ransomware and decrypt .SEX3 files

0
SEX3 is a computer virus classified as ransomware. Also, it was discovered to be a new version of another file encryptor called SATANA Ransomware. Software of this type is developed to encrypt potentially valuable data and demand file owners to pay money for their decryption. While running encryption, SEX3 Ransomware is programmed to alter targeted files with the .SEX3 extension. This is simply a visual change to highlight blocked data on top of successful encryption. After this, the virus changes the desktop wallpapers and also creates a text note called !satana!.txt that contains short instructions about how to unlock access to files.