iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to remove 0xxx Ransomware and decrypt .0xxx files

0
0xxx is a ransomware infection that encrypts various data using AES+RSA algorithms on NAS devices (Western Digital My Book). This measure is done to force victims into paying the so-called ransom in exchange for the blocked data. Just like other malware of this type, 0xxx uses its own extension (.0xxx) to rename the data. For example, a file piece titled as 1.pdf will change its look to 1.pdf.0xxx after encryption. All of these changes indicate that your data is no longer accessible. In other words, there is no way to open it anymore. In order to fix it, victims are called into following ransom instructions inside of the !0XXX_DECRYPTION_README.TXT text note. This note is dropped into each folder containing encrypted files. It is said that victims can decrypt their data by paying a 300 USD ransom in Bitcoin. At first, users are instructed to contact cyber criminals via e-mail. It is necessary to include your unique ID along with 3 files to test free decryption. As soon as contact with cybercriminals becomes established, victims will get the payment details to perform a transfer of money. Although extortionists claim they have no intention to fool you, there have been multiple cases when users did not receive the decryption tools even after the payment.

How to remove Redeemer Ransomware and decrypt .redeem files

0
Before getting to the removal, it is worth knowing what Redeemer Ransomware actually is. It is classified as a file-encrypting virus that blocks access to data stored on a compromised system. In order to show whether it is encrypted or not, Redeemer developers append the .redeem extension to each of the files. For instance, a file like 1.pdf will change its look to 1.pdf.redeem and reset its original icon. The system will no longer be able to open the files whilst they are encrypted. To return control over your data, it is necessary to buy special decryption software along with a unique key. More detailed information on that can be located inside of the Read Me.TXT note, which is created after encryption is over. Just below the Redeemer logo drawn from numbers, cybercriminals ask users to pay 20 XMR (Monero) cryptocurrency, which is about 4000$ for the decryption of data. Once you will be ready to do so, the next step is to contact extortionists attaching your personal ID key via their e-mail address (test@test.test). This is necessary to obtain the payment address for committing a transfer. As soon as they receive your decryption ransom, you should be given the promised tools to recover your data.

How to remove Poteston Ransomware and decrypt .poteston files

0
Poteston is classified as a ransomware infection that runs encryption of databases, photos, documents, and other valuable data. The whole encryption process can be easily spotted by users looking at new extensions assigned to files. This virus involves the .poteston extension to rename the stored data. To illustrate, a file named 1.pdf will change its look to 1.pdf.poteston as a result of encryption. As soon as these changes are seen, victims will no longer be able to access the data. As soon as these changes are seen, victims will no longer be able to access the data. To restore it, users are given instructions inside of the readme.txt note. Within the note, victims are greeted with bad news - all data we mentioned above has been encrypted. To redeem it back, victims are instructed to contact cyber criminals using their e-mail address (recovery_Potes@firemail.de). After establishing contact with them, you will be supposedly given the necessary details to perform a money transfer. Before doing so, you are also offered to send one of the blocked files for free decryption. This is a trick used by many extortionists to elevate the trust of victims. In addition to that, Poteston developers also inform against renaming encrypted data as you can potentially damage its configuration.

How to remove MANSORY Ransomware and decrypt .MANSORY files

0
MANSORY is a ransomware infection that runs vigorous encryption on personal and business data. This process involves cryptographic algorithms along with the appendance of new extensions. MANSORY uses the .MANSORY extension to each file piece that has been restricted. For instance, a file like 1.pdf will be changed to 1.pdf.mansory. After experiencing such changes, the blocked files will be no longer accessible. In order to regain access to them, victims have to pay a certain ransom in money. More information on that is presented inside a text note called MANSORY-MESSAGE.txt, which is created after the encryption is done. The first thing cybercriminals say is that gigabytes of valuable data have been downloaded to a secure location. Extortionists use it as collateral for intimidating users with the publication of data in case they refuse to pay money. Victims have a right to know how much data has been uploaded after contacting the cybercriminals via e-mail (selawilsen2021@tutanota.com; dennisdqalih35@tutanota.com; josephpehrhart@protonmail.com). Therefore, they can analyze the value of data that leaked into the hands of extortionists. As we already mentioned, not contacting cybercriminals will result in the gradual publication of data that has been hijacked from your network. To avoid it, victims are required to purchase the decryption software stored by cyber criminals themselves. This will also allow you to unlock all of the blocked data. Besides that, developers of MANSORY Ransomware offer to try free decryption by sending 2 random files from other computers to their e-mail.

How to fix Windows Update error 0x80240034

0
0x80240034 is an error code that prevents users from installing an update known as Windows 10 Insider Preview 16215.1000. Most people reported this update to get stuck at 1% and therefore crash receiving the corresponding error. There are hundreds of similar errors, which have the same source of reasons. Normally, they tend to occur due to damaged PC configuration caused by missing or corrupted files, software incompatibility, and many other reasons that require a separate solution. Below, we have provided a full guide dedicated to troubleshooting the 0x80240034 error. Read all instructions carefully and do not skip over the steps suggested by our experts.

How to fix service host SysMain (Superfetch) High CPU and Disk Usage

0
Also known as Superfetch, SysMain is a native Windows service meant to optimize system performance. However, some users tend to stumble into serious problems whilst having SysMain turned on. The service can eat a lot of resources, increasing disk and CPU usage significantly. This, therefore, results in freezes, slowdowns, and many other things deteriorating the system. If you open the Task Manager, you will see the SysMain service on top of the list demanding a high number of resources. It is quite strange that something meant to improve your system does completely the opposite, but this is the reality of Windows OS. Sometimes SysMain can go awry leading to terminates and overheating issues. If not resolved in time, your hardware may suffer serious damage and end up dying eventually. Luckily, there is a solution to this. Simply follow the instructions listed below.

How to remove FindNoteFile Ransomware and decrypt .findnotefile, .findthenotefile and .reddot files

0
FindNoteFile is the name of a ransomware infection that started its hunt for business users in June 2021. Just like other malware of this type, developers use AES+RSA algorithms to encrypt victims' data. FindNoteFile has been found distributed in 3 different versions. The only big difference between them is the name of the extension assigned to files after encryption (.findnotefile, .findthenotefile, or .reddot). For example, a file initially called 1.pdf will change its appearance to 1.pdf.findnotefile, 1.pdf.findthenotefile, or 1.pdf.reddot depending on which version attacked your system. Then, as soon as encryption is over, the virus creates a text note called HOW_TO_RECOVER_MY_FILES.txt, which contains ransom instructions. The text written inside is full of mistakes, however, it is still easy to understand what cybercriminals want from their victims.

How to fix Kernel-Power Critical error

0
Kernel-Power is an unexpected error displayed in Windows Event Viewer as critical. Windows describes this error as a result of your system being rebooted without cleanly shutting down first. It also states that this error may be associated with system crashes, loss of power, and other unexpected problems erupting for unexplained reasons. In log details of the error, users can see a number of metrics helping to pinpoint the problem. The Kernel-Power issue has Event ID 41, which means there is a problem of incorrectly shutting down your system. It usually pops when Windows cannot finish the session correctly and forced to restart after the last shutdown. As a rule, such problems emerge when there is an improper power supply. This can be related to hard disks, memory, and other additional devices that have destabilized power supply. In order to fix it, there is a couple of basic solutions that helped a lot of people resolve the problem. Follow our detailed instructions to do them below.