iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to remove FirstKill Ransomware and decrypt .FirstKill files

0
FirstKill is a ransomware infection designed to encrypt users' data and blackmail victims into paying financial ransom for its recovery. It uses AES and RSA military-grade algorithms to run strong encryption and prevent victims from re-accessing their files. During this process, FirstKill also renames all targeted files with the .FirstKill extension and resets their original icons to blank. For instance, a previously untouched file like 1.pdf will change to 1.pdf.FirstKill and become no longer accessible. Following this, the virus creates a text note called CO_SIĘ_STAŁO.html which contains instructions for decrypting the data.

How to remove ChinaHelper ransomware and decrypt .cnh files

0
ChinaHelper is a ransomware virus designed to encrypt personal data and blackmail victims into paying the ransom. While restricting access to data with the help of AES-256 and RSA-2048 algorithms, the virus assigns the .cnh extension so that a file like 1.pdf turns into 1.pdf.cnh, for instance. The next thing ChinaHelper does is creating a text note called README.txt. There is also another variant spotted in a later distribution, which assigned .cnhelp or .charm extension to files and created the HOW_TO_RETURN_FILES.txt file instead.

How to remove Bom Ransomware and decrypt .bom files

0
Bom is the name of a ransomware infection. Malware within this category encrypts system-stored data and demands victims to pay money for its return. This ransomware variant is also a by-product of the VoidCrypt family. During encryption, the virus renames all targeted files according to this example - 1.png.[tormented.soul@tuta.io][MJ-KB3756421908].bom. Your renamed files may slightly vary (e.g., different string of characters), but the basis will remain the same. After successfully restricting access to data, the ransomware creates a text note called Scratch - to provide decryption guidelines.

How to remove DASHA Ransomware and decrypt .ecrp files

0
DASHA Ransomware is a new variant of Eternity Ransomware. This malware is designed to encrypt system-stored data and demand money for its decryption. While restricting access to files (e.g., photos, videos, documents, databases, etc.), the virus alters file appearance with the .ecrp extension. For instance, a file previously named 1.pdf will therefore change to 1.pdf.ecrp and become no longer accessible. Once this process gets to a close and all targeted files are eventually renamed, DASHA replaces the desktop wallpapers and displays a pop-up window with ransom instructions.

How to fix “Your Computer is Low on Memory” error in Windows 10

0
This is the kind of message that may catch you off guard while using a Windows PC. It happens when the amount of allocated memory gets overused by one or various processes. Users can see detailed information about this by going to Task Manager and opening the "Memory" tab. This way, it becomes possible to figure out what processes consume the most memory and eventually lead your PC to be more sluggish. There can be multiple reasons why such a problem occurs - the most popular are usually registry and disk problems, app compatibility issues, lack of allocated virtual memory, badly-optimized software, or even a virus hiding itself under some process. If you are still in search of the problem solution, we thereby recommend you read our guidelines below and try each solution we offer.

How to fix “The local device name is already in use” error on Windows...

0
This is the kind of error users may face when trying to use a network-shared folder. It may also occur when users try mapping the operation of certain drives on a commonly shared network. Based on information collected from various technical forums, there are a number of reasons that may lead to this error. It can be due to unassigned drive letters, disabled File and Printer Sharing feature in firewall settings, insufficient space on the network's host server, and even wrong values of some Windows Registry entries. It may be quite hard to pinpoint the issue immediately and resolve it eventually. We recommend you try each solution from our guide until the one that sorts out the issue is found. Note that some steps that you will perform require attention, so make sure you do everything carefully with no rush.

How to fix ERR_SSL_PROTOCOL_ERROR in Google Chrome

0
ERR_SSL_PROTOCOL_ERROR is a browser problem that pops when there is difficulty in validating the SSL certificate on websites that you are trying to visit. SSL certificate is something a website owner acquires for money to merge from HTTP to HTTPS domain type for ensuring better security of data transmitted. You can clearly see if a website you visit has this certificate by looking at the icon before the domain name. If the certificate there is present, you will see an icon that looks like a gray or green lock. In most cases, your browser will write "This site can’t provide a secure connection" exactly when the SSL certificate failed to undergo validation. While there is no single reason for why this occurs, it is usually the conflict issue that got prompted by something. The list of culprits behind it can range from conflicting extensions, firewalls of third-party antimalware that blocks access to websites, over cached SSL state, and even incorrect time & date set on your PC - yes, that can be possible too! Below, you will find a list of solutions that might potentially work. Try each one of them until the issue gets finally resolved.

How to remove Loki Locker Ransomware and decrypt .Loki files

0
Loki Locker is the name of a ransomware virus designed to extort money from victims by running strong encryption of data. It uses a combination of AES-256 and RSA-2048 algorithms and also alters the names of encrypted data according to this template - [][]original_file.Loki. For instance, a file previously named 1.pdf will change to [DecNow@TutaMail.Com][C279F237]1.pdf.Loki and become no longer accessible. It is worth noting that there are also some newer versions of Loki Locker, which rename data with .Rainman, .Adair, .Boresh, .PayForKey, or .Spyro extensions. Following the successful blockade of files, the virus creates two files (Restore-My-Files.txt and info.hta) with similar ransom-demanding instructions. In addition, Loki Locker also replaces the desktop wallpapers to display brief steps on what should be done.