malwarebytes banner

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to remove Theva Ransomware and decrypt .theva files

0
Theva is the name of a ransomware virus that encrypts system-stored data and demands victims to pay money in Bitcoin for its decryption. During encryption, targeted files end up visually altered - for instance, 1.pdf will change to 1.pdf.[sql772@aol.com].theva and so forth with other files. Upon successful blockage of data, Theva Ransomware represents its decryption instructions in a text document called #_README_#.inf. It also changes victims' desktop wallpapers. In order to recover the data, victims are urged to contact cybercriminals via the given e-mail address (sql772@aol.com) and pay the ransom in Bitcoin cryptocurrency. It is said the price for decryption depends on how fast victims establish contact with swindlers. Following successful payment, threat actors promise to send the necessary decryption tool that will unlock all blocked data.

How to fix Windows Update error 0x80246019 on Windows 11

0
0x80246019 is an error code that may appear and prevent users from installing a new Windows update. This issue has mostly been reported to happen on Windows 11, however, there are also cases when it occurs on Windows 10 too. The most common scenario that triggers this error is users are trying to update their Windows 11 to the newer version 22H2, but other updates can also be involved. Here is the message that users face when updating fails due to this error: We couldn't install this update, but you can try again (0x80246019). Error 0x80246019 and other update issues are usually caused by system file corruption, damaged Windows update file, interference from third-party antivirus, and interference from connected USB devices as well. Whatever it is, you are not alone, and be sure you will fix this issue eventually - simply try each method from the instructions in our article below until the error no longer comes in appearance.

How to remove Eternity Ransomware and decrypt .ecrp files

0
Eternity is a ransomware virus that was discovered by Cyble researchers. This piece of malicious software belongs to the Eternity malware family and is designed to extort money from victims by encrypting potentially valuable data (with secure AES and RSA cryptographic algorithms). Dasha is another popular ransomware variant from this family. There are two known versions of Eternity - one does not change files visually and the other assigns the .ecrp extension to filenames and alters original icons. For instance, 1.pdf may either remain the same or become 1.pdf.ecrp after encryption depending on which ransomware version attacked the system. After successfully completing encryption, Eternity displays a pop-up window containing decryption instructions. Because Eternity Ransomware is a public Malware-as-a-service (MaaS) virus, which many threat actors may buy, the content of instructions (contact details, ransom size, countdowns, etc.) may slightly vary as well. Below are examples of ransom texts from two ransomware variants.

How to remove Black Hunt Ransomware and decrypt .black files

0
Black Hunt is a malicious infection classified as ransomware. Upon infiltration, it begins encrypting data and then blackmails victims into paying for decryption (in #BlackHunt_ReadMe.hta and #BlackHunt_ReadMe.txt ransom notes). While running encryption, the virus also assigns the victim's ID, cybercriminal's email address, and .black extension to influenced files. To illustrate, a file originally named 1.pdf will change to something like 1.pdf.[nnUWuTLm3Y45N021].[sentafe@rape.lol] and acquire the new Black Hunt icon as well. Desktop wallpapers get altered as well. Inside the ransom notes cybercriminals state victims have 14 days to contact them by e-mail and buy a unique key for decryption. Unless the deadline is met, threat actors say they will start selling or leaking the collected data to various third-parties. Victims can review their "data situation" via the provided TOR link.

How to fix OneDrive error code 0x80070194

0
0x80070194 is an error code that some users encounter when trying to open or copy files in OneDrive. As a result, this may cause OneDrive or File Explorer to crash. Here is a full message that comes about at the time of receiving the error: "An unexpected error is keeping you from copying the file. If you continue to receive this error, you can use the error code to search for help with this problem. Error 0x80070194: The cloud file provider exited unexpectedly.". The most common cause for this issue is a temporary glitch that happens in OneDrive's sync feature. Some other causes indicated by research can also be related to poor network connection or lack of new Windows updates designed for OneDrive's stable performance. So far, OneDrive Error code 0x80070194 has mostly been reported on Windows 10, however, it is also likely that it will touch some users on Windows 11 as well. Follow our instructions below to resolve the error and get back to using OneDrive without problems again.

How to remove ScareCrow Ransomware and decrypt .scrcrw or .CROW files

0
ScareCrow is a ransomware infection that first appeared on malware radars in 2019. Since then, the ransomware has undergone a couple of insignificant changes and upgrades. For instance, depending on which ScareCrow versions attacked the system, either .scrcrw or .CROW extensions will be assigned to targeted files. Ransomware infections are designed to encrypt potentially valuable data and hold it blocked until victims meet cybercriminals' demands to pay a ransom. ScareCrow uses a combination of AES and RSA cryptographic algorithms to thoroughly encryption of data. After successfully making files inaccessible, the virus automatically opens a pop-up window with decryption instructions. Please note that paying the ransom might not be mandatory - victims are advised to contact reputable ransomware researcher Michael Gillespie and decrypt ScareCrow files for free.

How to transfer data from iPhone to Android

0
We have already discussed how to migrate Android data to iPhone in our previous article and now it is time to do so vice-versa. If you recently bought a new Android device and want to switch to it from your iPhone, then this guide will be helpful for you. Transferring data between two devices that work on different operating systems is always a question that conjures the head of many users whenever it comes to such a necessity. In fact, there is nothing to worry about as there are a number of ways you can migrate the majority of iPhone data straight to your Android device. Read our guide below and choose the one that fits you the most to easily switch from iPhone to Android.

How to stop “Your Mailbox Is Full” e-mail spam

0
"Your Mailbox Is Full" is a widespread spam campaign that distributes fake messages saying users have overstuffed their mailbox storage and need to update it. The subject of such spam messages often contains titles like "Your mailbox is full", "ERROR ID: Mail-box storage full UPGRADE NOW!!!", or others depending on the spam variant. Inside the message, users are usually encouraged to click the "UPGRADE HERE", "UPGRADE STORAGE" or similar buttons to get more storage space for sending and receiving messages. In fact, all claims made by this spam campaign are fake and must not be trusted. The button that cybercriminals ask users to click simply leads to a phishing web page that requires entering e-mail login credentials. Please note that any properly-entered login credentials on phishing websites will most likely be recorded and become visible to threat actors standing behind this phishing affair. As a result, the collected data may not only be used for accessing e-mail accounts, but also for stealing other accounts (e.g., social media, e-wallet services, messengers, and so forth) that were registered with the same credentials. Social media accounts like Facebook may thereafter be manipulated for pretending to be the original owner and asking for loans from friends. Thus, if you got lured into entering details on the phishing website, we strongly advise you to change the password of your e-mail and other accounts that could potentially be exposed to the hijackers. Never become a victim of such spam techniques again and read our guide below to get effective tools for protecting yourself against them.