iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to remove DecYourData Ransomware and decrypt _all-files-encrypted files

0
Ransomware has been one of the most abused infections that endanger unprotected user's data. DecYourData developers did not trail behind and released their own piece as well. Using AES-256 algorithms it stalwartly ciphers multiple files found on your device. The range may vary from images, videos, music to simple text documents. Once encrypted, it, therefore, makes files inaccessible by appending new id-{random-set} [decyourdata@protonmail.com]_all-files-encrypted extensions to each file. For example, the original 1.mp4 file will be renamed into 1.mp4.id-{random-set} [decyourdata@protonmail.com]_all-files-encrypted meaning that the data is blocked. After the encryption, the ransom note will automatically appear on the screen with all the necessary information on how to decrypt your data. You will then realize that extortionists demand mind-blowing 5000$ for getting a unique decipher key that will unlock your data. The payment has to be processed solely in BTC and therefore sent to their Bitcoin wallet address that is mentioned in the note. They made everything possible to speed up the process and even presented a list of platforms where people can convert money into bitcoin. On top of that, they can also prove their integrity by decrypting one non-important file that can be sent through e-mail.

How to remove Afrodita Ransomware and decrypt your files

0
Ransomware has contributed to the fraudulent scheme base immensely and has become one of the most effective ways that hackers use to flush the finances out of innocent victims. Woefully, It is blooming up rapidly across the entire internet with the fact that all of the fraud's actions remain unpunished because of internet inaccessibility allowing to hide their atrocious activity so that nobody can detect them. And Afrodita Ransomware has also entered the game. It is used to encrypt user's files and other data with AES-256 and RSA-2048 encryption algorithms. Simply said, it totally restricts access to user's files until you pay a so-called ransom to get the files back to your legitimate ownership. After it is installed on your computer it immediately rushes down through your computer encrypting all of the images, videos, text files and other types of data that can make value for users. It, therefore, creates the __README_RECOVERY_.txt text document on the desktop with ransom note including the details on how to get a decrypting key to remove the blocking algorithm from your files. They can also offer you to decrypt a file by sending it via an email mentioned in the note to prove their integrity and be sure that your files will be delivered back in safety after you pay a specific fee. If you do not pay the ransom they might start threatening you that your files will be spread across the internet and utilized badly.

How to fix Windows Update error 0x80080005

0
Error 0x80080005 is an update-related issue that is very popular around Windows users. It was found a long time ago since Windows Vista debuted and remains unsolved these days. The problem pops up when trying to update your system to the latest pack version. Unfortunately, rebooting or even reinstalling Windows does not often lead to error decimation. There are a plethora of reasons why you may receive this error such as corrupted files, network configuration issues, presence of malware and so forth. This is why we have prepared a list of the most effective and acute ways to stop experiencing this issue on your computer.

How to fix ERR_TIMED_OUT error in Google Chrome

0
There has been quite a lot of users that keep facing this kind of error when trying to enter a website. After a long waited connection website fails to upload and shows the following message This site can't be reached and ERR_TIMED_OUT. The reload or reboot of the browser is totally useless, otherwise, you would not be looking for this article. This may be provoked by various kinds of issues starting with PC and browser hiccups and ending up with internet problems in an outside prism. In this article, our team has prepared a list of tools that you can apply to finally get rid of this problem and continue surfing calmly through the web.

How to remove Ako Ransomware and decrypt your files

0
Ako Ransomware is one of the fraudulent tools that is aimed to encrypt valuable files on user's computers and force them into paying a ransom. Ako Ransomware's activity was detected at the beginning of 2020 and has already been spread around Windows users. When it infiltrates your device, it raptly goes through every single folder offline consecutively restricting access to files like images, videos, PDFs, and others. Hackers use sophisticated methods to negate any interference from file decrypting tools by assigning unique cipher to each file which makes it almost impossible to decrypt them. Besides that, Ako Ransomware creates id.key file and puts it into the folder with encrypted data, that randomly changes the extension to a random set of letters and numbers, so it looks like this: 1.jpg.2mzWmb. After all, it generates the ransom note on your desktop with the necessary information to help you decrypt the files.

How to remove DCRTR-WDM Ransomware and decrypt .LOCKEDS, .CRYZP, .LOCK or .GOLD files

0
DCRTR-WDM Ransomware is encryption virus, endangering unprotected user's data on Windows computers. It is a successor of DCRTR Ransomware and uses the AES encryption algorithm to cipher information and demand ransom of $1270 in BTC (BitCoins). The virus was allocated to a separate subspecies in November 2018 and continued its activity in 2019 and 2020. DCRTR-WDM developers have been hiding their malware under fake "Windows Defender Monitor" updaters that can be downloaded from the web. Regrettably, once installed, it breaks all expectations because, instead of defending your PC, it instantly starts running scripts to encrypt the data stored on your computer. Currently, several generations of malware are active and distributed in the web. Besides that, frauds offer to decrypt one low-weight file that can be sent through the e-mail. This is just a trick to prove integrity and fool users into paying a ransom. However, you should never rely on their promises, because their main purpose is to deflate money and continue hunting for other victims. Unfortunately, bypassing the encryption often brings no fruits whatsoever, because developers use intricate AES-256 algorithms to encipher the data. However, with the help of our instructions, you will be able to remove it from your computer to prevent further data loss.

How to remove BitPyLock Ransomware and decrypt .bitpy, .domain_name or .andradegalvao files

0
BitPyLock was discovered by MalwareHunterTeam and therefore categorized as ransomware. The penetration of this kind of malware leads to instant encryption to all of the files stored on your computer. BitPyLock primarily attacks photos, videos, databases and office projects which appear to be most valuable for regular users. The program uses strong military-grade encryption algorithm, RSA-4096 to be exact, thereafter changing each file extension to .bitpy. For example, 1.mp4 will be transformed into 1.mp4.bitpy which makes it impossible to open any of those. There are also other forms of this ransomware that exploit data with .domain_name or .andradegalvao extensions. BitPyLock Ransomware makes everything possible to restrict you from manual recovery by deleting backup files from the system as well. By the end of encryption, it creates an HTML note with ransom payment details.

How to remove MedusaLocker Ransomware and decrypt .readtheinstructions, .decrypme or .encrypted files

0
We have already deconstructed lots of ransomware like Ouroboros, Ako, NEMTY, and others. Today, we are topping up our list with MedusaLocker Ransomware. This dreadful software is known to be encrypting the files of innocent users, therefore, making them unretrievable until a ransom is paid. Virus got its name because of the name of the project file, that says: MedusaLocker.pdb. Also, the "Medusa" section is created in the registry. Once installed on a computer, it rapidly blocks off the access to your data by assigning a unique .encrypted or .readtheinstructions or .readinstructions extensions to each file. This way, 1.jpg changes itself to 1.jpg.readtheinstructions. Unfortunately, any manipulations are useless because of the strong cipher that is hard to break manually. When encrypting files, AES encryption will be used to encrypt each file, and then the AES key will be encrypted with the RSA-2048 public key included in the Ransomware executable. Depending on ransomware edition, extensions may also look like .bomber, .boroff, .breakingbad, .locker16, .newlock, .nlocker, and .skynet as well. After successful encryption of data, extortionists add an HTML or text file, called ransom note, that contains the necessary information on how to recover your data.