Logo

Android malware spies while posing as a Update

New malware with extensive spyware capabilities steals data from infected Android devices and is designed to automatically trigger whenever new info is read to be exfiltrated. The spyware can only be installed as a 'System Update' app available via third-party Android app stores as it was never available on Google's Play Store. This drastically limits the number of devices it can infect, given that most experienced users will most likely avoid installing it in the first place. The malware also lacks a method to infect other Android devices on its own, adding to its limited spreading capabilities.

However, when it comes to stealing your data, this remote access trojan (RAT) can collect and exfiltrate an extensive array of information to its command-and-control server. Zimperium researchers who spotted it observed it while "stealing data, messages, images and taking control of Android phones."

What happens when malicious software is installed

"Once in control, hackers can record audio and phone calls, take photos, review browser history, access WhatsApp messages, and more," they added. Zimperium said its extensive range of data theft capabilities includes:

  • Stealing instant messenger messages;
  • Stealing instant messenger database files (if the root is available);
  • Inspecting the default browser's bookmarks and searches;
  • Inspecting the bookmark and search history from Google Chrome, Mozilla Firefox, and Samsung Internet Browser;
  • Searching for files with specific extensions (including .pdf, .doc, .docx, and .xls, .xlsx);
  • Inspecting the clipboard data;
  • Inspecting the content of the notifications;
  • Recording audio;
  • Recording phone calls;
  • Periodically take pictures (either through the front or back cameras);
  • Listing of the installed applications;
  • Stealing images and videos;
  • Monitoring the GPS location;
  • Stealing SMS messages;
  • Stealing phone contacts;
  • Stealing call logs;
  • Exfiltrating device information (e.g., installed applications, device name, storage stats).

How does it work?

Once installed on an Android device, the malware will send several pieces of info to its Firebase command-and-control (C2) server, including storage stats, the internet connection type, and the presence of various apps such as WhatsApp. The spyware harvests data directly if it has root access or will use Accessibility Services after tricking the victims into enabling the feature on the compromised device. It will also scan the external storage for any stored or cached data, harvest it, and deliver it to the C2 servers when the user connects to a Wi-Fi network. Unlike other malware designed to steal data, this one will get triggered using Android's contentObserver and Broadcast receivers only when some conditions are met, like the addition of a new contact, new text messages, or new apps being installed.

"Commands received through the Firebase messaging service initiate actions such as recording of audio from the microphone and exfiltration of data such as SMS messages," Zimperium said.

"The Firebase communication is only used to issue the commands, and a dedicated C&C server is used to collect the stolen data by using a POST request."

Camouflage

The malware will also display fake "Searching for the update.." system update notifications when it receives new commands from its masters to camouflage its malicious activity. The spyware also conceals its presence on infected Android devices by hiding the icon from the drawer/menu. To further evade detection, it will only steal thumbnails of videos and images it finds, thus reducing the victims' bandwidth consumption to avoid drawing their attention to the background data exfiltration activity. Unlike other malware that harvests data in bulk, this one will also make sure that it exfiltrates only the most recent data, collecting location data created and photos taken within the last few minutes.

If you would like to read more helpful articles and tips about various software and hardware visit errortools.com daily.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Best Browsers in 2021 with browser description
In today's digital life, when we access the internet daily, browsers are essential almost as our operating system, after all, we do access all of the internet data via them, and having a good, reliable, and personal browser tailored for our needs can make all the difference in the world. In today's article, we will introduce you to the five greatest browsers of today, we will point their advantages and disadvantages and why should you pick one or another. As with each piece of software, there is not an ultimate browser, better than anything else and we will not favor anyone on this list, the decision which you should use is solely up to you, we are here to provide you with an objective opinion on each one. All of this being said, let's begin with the countdown in no particular order.
  1. Mozilla firefox.

    firefox browser If you consider yourself a power user or you value your privacy then firefox is the browser for you. It is open source and is packed with great features like reporting when your email has been used for a known data breach, it stops annoying pop-up notifications, stops browser fingerprinting, and many more. Firefox is also a cross-platform browser making it a great choice if you want to transfer and use your data across multiple devices with one account. The downside of firefox however is its speed, this browser is the slowest on this list, I guess features and advantages took their tool in the speed department, but if that is not a concern for you and you feel like the positives outweigh some slower speed, grab it here.
  2. Google Chrome

    chrome browser Chrome browser has been a game-changer when it was released and even today some of its features are still great and needed. It is packed with some great features like tab freezing, for example, it is cross-platform meaning that also as firefox you can change data between browsers on different devices. it is a very expandable browser with tons of extensions and its speed performance is very very good. The downside of Chrome are two things sadly, one of them is its hunger for RAM, the browser takes a big chunk of RAM once it is active and on some older computer with limited RAM it performs slowly, another is telemetry which its sending, in other words, other browsers don’t come with the lingering fear that Google’s just a little bit too involved in all of our lives. But if downsides do not trouble you and you have a decent amount of RAM in your system chrome might be the best solution for you, grab it here and check it out.
  3. Microsoft Edge

    edge browser Or should I say Microsoft edge 2.0 since this new Edge is completely recoded and rethought, a completely new browser based on chromium. The first version of the edge was an inhouse attempt from Microsoft and it was a disaster, I guess the lesson was learned, and this new edge we have today is a great Browser, it is lightning fast and packed with some great features with one among them standing out I just love, that is the ability to save web pages as applications and truth to be told you have to try this in order to see al great advantages it offers. A very interesting feature is that edge itself wins the speed race from all of the 5 contestants here which is a great surprise. Of course, the downside of annoying Microsoft pushing it to be your default is, well it's Microsoft, as chrome is tied to Google so is edge tied to Microsoft, and the same dreaded feeling that big MS is watching you. If however, you do not concern yourself with these kinds of things, since it is already part of Windows 10, give it a spin and try it, I am sure you will at least love its blazing speed.
  4. Vivaldi

    vivaldi browser A new kid on the block, relatively unknown Browser Vivaldi offers some great customizable features no other one on this list offers, a very unique and down to each detail customization option, you can literally tweak each and every aspect of this browser making it best customizable and personal browser ever. How it is also based o chromium, every chrome extension works in it naturally. It is very good in speed and constantly updated and developed. The downside, well if you are anything like me, you could spend ages trying to customize it, ages, it has tons of features, and making it really feel and tick as you want can consume a really lot of time. If this thing does not bother you at all, grab Vivaldi here.
  5. Opera

    opera browser Last but not least, we have another relic of the old browser age, the Opera browser. Packed with great security and great in-house features like a built-in VPN, built-in ad blocker, built-in crypto wallet, etc this browser seems like a swiss army knife. Opera is full of features and it shows once you start using it. The downside of opera is that its look and feel are specifically tailored to a certain type of user and not everyone will find that appealing or attractive, add some great but hidden and hard to come by features and it may go unnoticed. However, I think you should really give it a go since it definitely deserves more attention than it gets. Grab it here and check it out.
That's it, 5 great browsers to look up, I hope that you have enjoyed the read and I hope to see you again here for more articles. If you would like to read more helpful articles and tips about various software and hardware visit errortools.com daily.
Read More
Fix Windows Activation Error 0x80070005
Windows uses 2 types of keys for its activation, KMS or MAK. These keys should work without any issues since they are elevated with higher permissions but in some cases, they are by accident run without their proper permission, and then we have access denied error or error 0x80070005 To resolve this issue please first check if not by any chance your antivirus or firewall is preventing slmgr.bs file to access the right permissions, that being said if the previous solution is not working note that you have to be an administrator of the system or have administrator privileges. As an administrator, you will have to use Software Licencing Management Tool or short SLMGR.VBS, a VBS file in Windows used for its activation purposes. As an administrator, open Command prompt with admin permissions and then run slmgr.vbs This will make sure that activation goes through, make sure to use proper options like:
/ipk <ProductKey> or /ato [<Activation ID>]
Read More
How to remove CrazyForCrafts From Your PC

CrazyForCrafts is a Browser Extension from Mindspark Interactive. This Toolbar Extension allegedly offers users tons of DIY crafting guides and tricks, however all that it does is point you in the right direction. It links you back to some of the most popular DIY Crafting websites on the internet that you can find at any time by a simple search.

While this may look useful and faster than looking around the internet for good DIY projects, remember that this extension injects itself into your browser, changing your new tab page to Search.MyWay.com and records your browsing habits, can view your internet history, and know whatever you are looking for or viewing online.

While using this extension you will see additional pop-up ads, sponsored content, and injected ads throughout your browsing sessions.

Due to its behavior this extension has been marked for removal by several anti-virus scanners, and it is recommended to remove it from your computer to prevent data leaks.

About Browser Hijackers

Browser hijackers (sometimes called hijackware) are a type of malicious software that alters web browser configuration settings without the computer owner’s knowledge or permission. These hijacks appear to be increasing at an worrying rate around the world, and it can be really nefarious and sometimes dangerous too. They’re designed to disrupt browser functions for many different reasons. These are typically used to force visitors to a specific website, manipulating web-traffic to earn ad revenue. Although it might appear naive, all browser hijackers are damaging and therefore always classified as security threats. In a much worst case, your internet browser could be hijacked to download malware that will do a great deal of damage to your computer or laptop.

How one can know whether the browser is hijacked?

Symptoms that a web browser is hi-jacked include: the browser’s homepage is changed; new bookmarks pointing to pornographic sites have been added to your favorite pages; the essential web browser settings are modified and unwanted or insecure sites are added to the trusted websites listing; you are finding new toolbars you have never found before; you might see numerous pop-up ads on your computer screen; your browser has become unstable or starts running sluggishly; Inability to navigate to certain sites, especially antivirus as well as other computer security software websites.

How browser hijacker infects computers

Browser hijackers may use drive-by downloads or file-sharing websites or perhaps an e-mail attachment to reach a targeted PC. They also come from add-on software, also called browser helper objects (BHO), browser extensions, or toolbars. Also, certain freeware and shareware can put the hijacker in your PC through “bundling”. Examples of well-known browser hijackers are Fireball, CoolWebSearch. GoSave, Ask Toolbar, RocketTab, and Babylon Toolbar. The presence of any browser hijacker on your system might substantially diminish the web browsing experience, track your online activities that result in serious privacy concerns, develop system stability problems and eventually cause your computer to slow down or to an almost unusable condition.

How to remove a browser hijacker

Some hijackers can be easily removed by uninstalling the free software they were included with or by removing any extension you’ve recently added to your browser. But, most hijacking codes are certainly not very easy to get rid of manually, as they go much deeper into your operating system. You should consider performing manual repairs only if you’re a tech-savvy person, as potential risks are associated to tinkering with the system registry and HOSTS file. Browser hijackers could be effectively removed by installing anti-malware software on the affected system. SafeBytes Anti-Malware can counter relentless browser hijackers and provide you with proactive PC protection against all kinds of malware. In addition to anti-virus software, a system optimizer software, like Total System Care, will help you correct Windows registry errors, remove unwanted toolbars, secure online privacy, and stabilize software programs installed on your PC.

Virus Blocking Access To Safebytes Website And Anti-Malware Downloads - What You Should Do?

Malware can cause all kinds of damage once they invade your PC, ranging from stealing your private details to deleting files on your PC. Some malware is meant to interfere with or prevent things that you wish to do on your PC. It may well not allow you to download anything from the net or it will stop you from accessing a few or all internet sites, especially the anti-malware sites. If you’re reading this, odds are you’re stuck with a malware infection which is preventing you to download or install Safebytes Anti-Malware program on your system. Although this type of issue will be difficult to get around, there are a few steps you can take.

Get rid of malware in Safe Mode

The Windows-based PC has a special mode referred to as “Safe Mode” in which only the minimum required applications and services are loaded. In the event the malware is blocking access to the internet and affecting your computer, starting it in Safe Mode enables you to download antivirus and run a scan while limiting potential damage. To enter into Safe Mode or Safe Mode with Networking, press the F8 key while the computer is booting up or run MSCONFIG and locate the “Safe Boot” options under the “Boot” tab. As soon as you restart the PC into Safe Mode with Networking, you may download, install, as well as update anti-malware software from there. Following installation, run the malware scanner to eliminate standard infections.

Obtain the antivirus software using an alternate web browser

Malicious code could exploit vulnerabilities on a particular browser and block access to all anti-virus software websites. If you appear to have a virus attached to Internet Explorer, then switch over to a different browser with built-in safety features, such as Firefox or Chrome, to download your favorite anti-malware program – Safebytes.

Make a bootable USB anti-virus drive

Here’s yet another solution which is using a portable USB anti-malware software package that can check your computer for malicious software without needing installation. To run anti-malware using a USB drive, follow these simple steps: 1) Download the anti-malware on a virus-free PC. 2) Plug the Flash drive into the uninfected computer. 3) Double click on the exe file to run the installation wizard. 4) Choose the drive letter of the pen drive as the place when the wizard asks you where you would like to install the antivirus. Follow activation instructions. 5) Remove the pen drive. You can now utilize this portable anti-malware on the affected computer system. 6) Run the Safebytes Anti-malware directly from the pen drive by double-clicking the icon. 7) Click “Scan Now” to run a complete scan on the infected computer for malware.

Features of SafeBytes Anti-Malware

If you are planning to buy anti-malware for your computer system, there are lots of brands and packages for you to consider. A few of them are great, some are ok types, and some will destroy your computer themselves! You have to be careful not to select the wrong application, especially if you buy a paid software. Amongst few good applications, SafeBytes Anti-Malware is the highly recommended tool for security-conscious people. SafeBytes antimalware is a very effective and easy to use protection tool which is designed for end-users of all levels of computer literacy. With its cutting edge technology, this software will help you get rid of multiples types of malware which includes viruses, worms, PUPs, trojans, adware, ransomware and browser hijackers.

SafeBytes anti-malware takes PC protection to a whole new level with its enhanced features. A few of them are given as below:

Real-time Threat Response: SafeBytes offers complete and real-time security for your personal machine. This utility will constantly keep track of your PC for any suspicious activity and updates itself regularly to keep abreast of the latest threats. World-class AntiMalware Protection: Using its advanced and sophisticated algorithm, this malware elimination tool can identify and get rid of the malware threats hiding in your computer effectively. Web protection: SafeBytes checks the hyperlinks present on a web page for possible threats and alerts you if the website is safe to view or not, through its unique safety rating system. Lightweight: SafeBytes is lightweight software. It use up a very small amount of processing power as it works in the background so you’re free to use your Windows-based PC the way you would like. 24/7 Support: You can get totally free 24/7 technical assistance from their computer experts on any product queries or computer security issues. Overall, SafeBytes Anti-Malware is a solid program since it has plenty of features and could detect and remove any potential threats. Now you may realize that this tool does more than just scan and delete threats from your PC. For the best protection and the best value for money, you can’t get better than SafeBytes Anti-Malware.

Technical Details and Manual Removal (Advanced Users)

To get rid of CrazyForCrafts manually, navigate to the Add/Remove programs list in the Control Panel and choose the offending program you want to get rid of. For web browser plug-ins, go to your web browser’s Addon/Extension manager and select the plug-in you want to remove or disable. It is also suggested to reset your browser to its default condition to fix corrupt settings. If you choose to manually delete the system files and registry entries, use the following checklist to make sure you know exactly what files to remove before undertaking any actions. Please keep in mind that this is for skilled users only and might be challenging, with incorrect file removal leading to additional system errors. Additionally, certain malicious programs have the capability to defend against its deletion. Completing this task in Safe Mode is advised.
Registry: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWpm HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain Default_Page_URL HKEY_LOCAL_Machine\Software\Classes\[adware name] HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run .exe HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\random HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\run\random HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings CertificateRevocation = 0
Read More
Different types of computer viruses
Computer viruses are malicious applications that have the ability to self replicate and spread over the system and various devices, just like viruses in organisms. We all know that computer viruses are bad and that you should avoid them however you can. So in this spirit, we are taking a deeper dive into what kind of viruses exist and how they function.

viruses types1. File-infecting Virus

A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting.

2. Macro Virus

This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments.

3. Browser Hijacker

This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting. This virus can pose other threats such as changing the default home page of your browser.

4. Web Scripting Virus

A very sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.

5. Boot Sector Virus

These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling control of your computer.

6. Polymorphic Virus

This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.

7. Resident Virus

A resident virus stores itself on your computer’s memory which allows it to infect files on your computer. This virus can interfere with your operating system leading to file and program corruption.

8. Multipartite Virus

A type of virus that is very infectious and can easily spread on your computer system. It can infect multiple parts of a system including memory, files, and boot sector which makes it difficult to contain.
Read More
Couldn’t open PDF in Edge Error in Windows
As you know, Microsoft Edge is the default web browser in Windows 10 operating system. It is a built-in browser that replaced the ancient Internet Explorer for its performance and features. Aside from being the default web browser, it is also set as a default PDF viewer in Windows 10. So if you open a PDF file, it will be automatically opened in the Edge browser even if you have installed a PDF reader on your computer. However, some users recently reported getting an error that says, “Couldn’t open PDF in Edge, Something’s keeping this PDF from the opening” when they tried to open a PDF file or view an internet link that has a downloadable PDF file in the Edge browser. If you are one of these users, read on as this post will help you troubleshoot the problem and fix it. This kind of error mostly occurs if you have installed other PDF viewers on your computer. They could be interrupting Edge while it tries to open the PDF documents. To fix it, check if Microsoft Edge is set as the default PDF viewer or you could also try to clear its browsing cache. In addition, you could also reset or repair Edge. For detailed instructions, refer to the given options below.

Option 1 – Check if Microsoft Edge is set as the default PDF viewer

The first thing you can do is to check if Edge is set as the default PDF viewer. If it’s not, you have to set it as one to fix the problem.
  • Open Control Panel and go to Default Programs.
  • Then click on the “Associate a file type or protocol with a program” option.
  • Next, select the PDF file option and click on Change program.
  • After that, select Microsoft Edge in the pop-up window and then select the “Always use this app to open .pdf” option.
  • Now click the OK button to set Edge as the default PDF viewer and then check if you can now open the PDF file in the Edge browser.

Option 2 – Clear the browser cache of Microsoft Edge

  • Open Microsoft Edge.
  • Then click on the three horizontal dots to open the menu.
  • From there, click on Settings. And under Settings, click the “Choose what to clear” button under the Clear browsing data section.
  • Next, check all the checkboxes and then click the Clear button to clear the browsing data in the Edge browser.
  • Restart Edge.

Option 3 – Reset, repair or reinstall Microsoft Edge via Settings

You can reset, repair or reinstall the Edge browser through Settings. If none of it helped, you can try the following:
  • Open File Explorer and then go to this path – C:/Users/YourUsername/AppData/Local/Packages
Note: Before you type in the path in the Address bar, make sure that you put your user account name in place with the “YourUsername”.
  • Tap Enter to proceed.
  • Next, look for the folder named “MicrosoftEdge_8wekyb3d8bbwe” then right-click on it.
  • Click on Properties and uncheck the option “Read-only” under the General tab in the Properties window.
  • Click on Apply and then OK to save the changes made.
  • After that, look for the MicrosoftEdge_8wekyb3d8bbwe folder again and delete it. And if a prompt stating “Folder Access Denied” appears on your screen, just click on the Continue button to proceed – doing so will delete most of the content inside the folder except for the folder named “AC”.
  • Restart your PC.
  • Now all you have to do is to re-register Microsoft Edge using PowerShell. In the Start Menu, search “Windows PowerShell”.
  • Right-click on Windows PowerShell from the search results and select the “Run as administrator” option.
  • Type in this command in the PowerShell windows and tap Enter – Cd C:/Users/YourUsername
Note: Once again, make sure that you key in your user account name in place of “YourUsername.
  • After that, type in this command and tap Enter – Get-AppXPackage -AllUsers -Name Microsoft.MicrosoftEdge | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register "$($_.InstallLocation)AppXManifest.xml" -Verbose}
  • Restart your PC.
Read More
Software review series: BitWarden
BitWardenMany times we were talking and writing here on Errortools.com about security, privacy, hacking, identity theft, etc. We tried to raise important security questions and I hope I have managed to at least shed some light and change maybe some bad behaviors for some, helping them embrace better routines about their security on their PC. In this light, I will today present you with one neat and awesome piece of software, a password manager worth your time and money (if you want premium features): BitWarden.

What BitWarden offers?

The first thing that it offers is the completely free basic plan, granted BitWarden is not an open-source project nor completely free but it has an unlimited free basic plan that will cover 90% of user needs. There is also a free basic unlimited plan for Organizations letting you and one more user share files and other stuff via BitWarden making it a cool option if you need it. Premium features offer you encrypted sharing of files, two-step login, 1GB file attachments (encrypted), Bitwarden Authenticator (TOTP), Vault Health Reports, Emergency Access, and Priority Support. The cost for all of these additional features is 10 USD per year for an individual plan or 40 USD per year for organizations where you will get an increase of maximum users from 2 to 6. Yes, you read that correctly, only 10 USD per YEAR for the whole set of features. Granted if you do not need any of them, enjoy the free version forever. Besides very low premium cost BitWarden will offer you compatibility with all major browsers and devices including both Android and iOS platforms making it a great cross-platform solution to login and maintain your passwords anywhere with just one click. Once installed all you need to do is set one master password and be very careful not to lose or forget this one, if you do all of your other generated passwords will be lost forever.

Features

Secure Password Sharing

Share your encrypted data quickly and easily, and only with the users or teams who need access

Cross-Platform Accessibility

Access critical data in your Bitwarden vault from any location, browser, and device

Cloud-Based or Self-Host

Get up and running in minutes in the cloud or you can self-host Bitwarden for complete data control

Security Audit & Compliance

Open source and third-party audited, Bitwarden complies with Privacy Shield, GDPR, CCPA regulations

Vault Health Reports

Access insightful reports to reveal weak, reused passwords, and other helpful data security metrics

Directory Sync

Our powerful Directory Connector streamlines user and group onboarding and keeps them in sync

Always-On Support

Our Customer Success agents are available to support you around the clock

Detailed Event Logs

Bitwarden creates audit trails to help you keep track of user and group access to sensitive data

Flexible Integrations

Unite your existing systems with Bitwarden using SSO authentication, Directory services, or powerful APIs

Conclusion

There are many password managers out there but via recommendation I have tried BitWarden and truth to be told, I really never felt the need to try anything else, it is great at what it does and it is moving forward with features and it is constantly updated and maintained.
Read More
How to Fix Unknown Hard Error in Windows 10
The “Unknown Hard” error that keeps on appearing in Windows 10 can put users in an unpleasant situation. This kind of error leads to the freezing of the taskbar, blackening of the screen, and sudden disappearance of the icons on the Desktop. And each time you try to open Windows, the system will only give you an error message saying that it’s a critical error and some applications like Start and Cortana won’t work. Upon analysis, it seems that the “sihost.exe” is not responding and that it is the one that’s causing the c000021a Unknown Hard error to pop up. Sihost.exe files represent the Shell Infrastructure Host which is an essential component in the Windows operating system. The Windows Shell Infrastructure Host is primarily responsible for handling some graphical elements of the operating system interface such as the Start menu and the taskbar transparency. And so if the Shell Infrastructure or Sihost.exe has stopped, has been removed, or corrupted, you will most likely have issues with the overall functionality of the Windows operating system and you’ll get the Unknown Hard error In addition, the ctfmom.exe Unknown Hard error may also occur due to incompatible drivers installed on your PC. Ctfmom is a process that identifies inputs such as handwriting, languages, and many more. It’s the one that controls the functions of background behavior. To resolve this issue, you need to first try to identify which application is the one that’s running the sihost.exe file. And if needed, you need to either update or reinstall or completely uninstall the problematic application.

Option 1 – Try to run the System File Checker

The SFC Scan or System File Checker, us a built-in utility in Microsoft Windows that can be found in the C:\Windows\System32 folder. This tool allows users to scan and restore any corrupted system files in Windows that might be causing the Unknown Hard error to appear. Before you use this tool, make sure to find out whether the sihost.exe on your computer is a Trojan that you have to remove or if it’s a file that belongs to a trusted Windows application. Once you have that sorted out, follow the steps below.
  • Tap Win + R to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.

Option 2 – Try to use System Restore

You can also try using System Restore. This is one of the ways you can use it to back up your PC. Since restore points are created automatically each week by System Restore, you can use System Restore to restore your computer back to an earlier good point in time.

Option 3 – Try to troubleshoot the error in a Clean Boot State

Putting your PC in a Clean Boot state can help you diagnose and troubleshoot the issues in your system. During this state, you can start the system with a minimum number of drivers and startup programs that will surely help you in isolating the root cause of the Unknown Hard Error.
  • Log onto your PC as an administrator.
  • Type in MSConfig in the Start Search to open the System Configuration utility.
  • From there, go to the General tab and click “Selective startup”.
  • Clear the “Load Startup items” checkbox and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
  • Next, click the Services tab and select the “Hide All Microsoft Services” checkbox.
  • Click Disable all.
  • Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
After putting your PC in a Clean Boot State, try creating a system restore point and see if the problem still occurs. Clean Boot troubleshooting is designed to help you isolate the problem. For you to execute a clean boot troubleshooting, you must do a couple of actions (the steps are given above) and then restart your PC after every action. You might have to disable one third-party app after the other to really isolate the issue. And once you’ve narrowed down the problem, you can either disable the third-party app that’s causing the problem or remove it. Note that you must switch your PC back into the Normal Startup mode after you’re done troubleshooting the problem. Here’s how you can do it:
  • From the “Start” menu, go to System Configuration.
  • After that, switch to the General tab and click the option for “Normal Startup”.
  • Next, go to the Services tab and clear the checkbox for “Hide all Microsoft services”.
  • Then find and click “Enable all” and if prompted, you have to confirm.
  • Afterward, go to the Task Manager and enable all the Startup programs and confirm the action.
  • Restart your PC when prompted.
Read More
Fix Error Code 0x80090016 for PIN and MS Store
If you encounter Error Code 0x80090016 while trying to create a PIN or when you are using Microsoft Store, then you’ve come to the right place as this post will guide you in how you can fix this problem. Recently some users reported that they were unable to sign in or set up the Windows 10 Login PIN. Note that the potential fixes for this issue are totally different in both scenarios. Here’s the error message you get when you encounter the PIN related error:
“Something went wrong, We weren’t able to set up your PIN. Sometimes it helps to try again or you can skip for now and do this later.”
On the other hand, here’s the error message you get for the Microsoft Store-related error:
“Try that again, Something happened on our end and we couldn’t sign you in.”
Here are some potential fixes you can try to fix the Error Code 0x80090016 in the Microsoft Store:

Option 1 – Try to sync the Date and Time

The first thing you can try is to sync the Date and Time of your computer as the wrong Date and Time settings are one of the most common causes of connection problems like the Error Code 0x80090016. This is because of the incompatibility between the SSL Certificate validation date and the System Clock. Thus, you have to sync your System Clock. Refer to the steps below to do so.
  • Start by tapping the Win + I keys to open the Windows Settings.
  • Next, go to Time & Language > Date & time.
  • From there, turn the toggle on for the “Set time automatically and Set time zone automatically” option on the right-side panel.
  • After that, click on Region & language located on the left side panel and make sure that the Country or region on the right-side panel is set to the country you live in.
  • Now close the Settings app and restart your computer and see if it fixes the problem or not.

Option 2 – Try to re-register the Microsoft Store app via PowerShell

  • Tap the Win + X key combination or right-click on the Start button and click on the Windows PowerShell (Admin) option.
  • If a User Account Control or UAC prompt appears, just click on Yes to proceed and open the Windows PowerShell window.
  • Next, type in or copy-paste the following command to re-register the Microsoft Store app and tap Enter:
powershell -ExecutionPolicy Unrestricted Add-AppxPackage -DisableDevelopmentMode -Register $Env:SystemRootWinStoreAppxManifest.xml
  • Wait for the process to be completed and then restart your computer.

Option 3 – Try to reset the Microsoft Store cache

Just like browsers, Microsoft Store also caches as you view apps and games so it is most likely that the cache is no longer valid and must be removed. To do so, follow the steps below.
  • Right-click on the start button and click on Command Prompt (administrator).
  • Next, type in the command, “exe” and tap Enter. Once you do, the command will clear the cache for the Windows Store app.
  • Now restart your PC and afterward, try opening Microsoft Store again and then see if Error Code 0x80090016 is resolved or not.

Option 4 – Try to run the Windows Store Troubleshooter

The Windows 10 Store Apps Troubleshooter will help you in fixing the Error Code 0x80090016. This is a great built-in tool from Microsoft that helps users fix any app installation issues. So this is worth a try to solve the problem. This built-in tool also helps you fix the Windows 10 Store if it isn’t working. To use the Windows Store Troubleshooter, follow the steps below.
  • Tap Win + I keys again to open the Windows Settings panel.
  • Go to Update & Security and then go to Troubleshoot.
  • On your right-hand side, scroll down to find the Windows Store Apps and then click on Run the troubleshooter option and see if it fixes the problem.
On the other hand, you can use the options below if you encounter Error Code 0x80090016 while setting up your PIN.

Option 5 – Try to manage the NGC Folder

  • You need to boot your computer into Safe Mode first.
  • Next, delete all the contents of the NGC folder and you can do that by taking ownership of the folder first. To do so, refer to these sub-steps:
    • First, locate the concerned folder and right-click on it then select Properties.
    • Next, click on the Edit button in the Properties window and click OK to confirm if you got a User Account Control elevation request.
    • After that, select user/group from the permission windows or click on the Add button to add another user or group. It would be best if you add “Everyone” to give permission.
    • Then check “Full Control” under the “Allow” column to assign full access rights control permissions.
    • Now edit the permission to Full Control for “Everyone”.
    • Click OK to save the changes made and then exit.
  • After you take ownership of the folder, you can now delete all of its contents.
  • Once you’re done, restart your computer and see if the problem is fixed.

Option 6 – Try to use the Group Policy Editor

  • Tap the Win + R keys to open the Run dialog box
  • Then type “gpedit.msc” in the field and hit Enter or click OK to open the Group Policy Editor.
  • Next, navigate to this setting: Computer Configuration > Administrative Templates > System > Logon
  • After that, double click on “Turn on convenience PIN Sign-in” and set its radio button to Enable. This policy setting has the following description:
“This policy setting allows you to control whether a domain user can sign in using a convenience PIN. If you enable this policy setting, a domain user can set up and sign in with a convenience PIN. If you disable or don’t configure this policy setting, a domain user can’t set up and use a convenience PIN. Note: The user’s domain password will be cached in the system vault when using this feature. To configure Windows Hello for Business, use the Administrative Template policies under Windows Hello for Business.”
  • After you set the radio button to Enable, it will turn on the Logins using the PIN. Note that setting the radio button to Disabled or Not Configured will turn off the Logins using the PIN.
  • Now exit the Group Policy Editor and restart your PC so that the changes can take effect.
Read More
Fix Windows was unable to repair the drive
If you connected your Hard Disk, USB, or SD card to your Windows 10 computer and you suddenly encounter an error that says, “Windows was unable to repair the drive”, read on as this post will help you fix the problem. This kind of error indicates that the file system on the drive has become corrupted and that ChkDsk was not able to repair the problem. You can also encounter this error when you try to run the ChkDsk utility to repair the system. This kind of error is most likely due to the general corruption of the contents in the drive. It is also possible that you removed the external drive without using the “Safely remove hardware” option or it could be that the drive is still in use. To fix the problem, the obvious thing to do is to safely remove the external drive by using the “Safely remove hardware” option. If it didn’t work, you can try to run the CHKDSK utility from the command line or you could also restart your computer in a Clean Boot State and then run the scan. Before you proceed with the potential fixes provided below, make sure that you create a system restore point first or you could also create a backup copy of the data to an external drive.

Option 1 – Run the CHKDSK utility from the command line

Although some users reported getting the “Windows was unable to repair the drive” when they run a CHKDSK scan, other users reported that running it also fixed the error. Thus, you can try to run it and see if it works or not.
  • In the Windows Search box, type “command prompt” and from the search results, right-click on Command Prompt and select “Run as administrator”.
  • After opening Command Prompt, type this command and tap Enter: chkdsk <Partition Letter>: /f
  • The command you entered will start to check for errors and fix them automatically. Else, it will throw an error message saying, “Chkdsk cannot run because the volume is in use by another process. Would you like the schedule this volume to be checked the next time the system restarts? (Y/N)”.
  • Tap the Y key to schedule Disk Check the next time your computer restarts.

Option 2 – Restart your computer in a Clean Boot State

There are some instances that some conflicting programs installed in your computer might be the one that triggers the “Windows was unable to repair the drive” error to appear when you connect your external drive or run the CHKDSK utility. To identify which program is causing the problem, you need to put your computer in a Clean Boot State. To do so, follow the steps below.
  • Log onto your PC as an administrator.
  • Type in MSConfig in the Start Search to open the System Configuration utility.
  • From there, go to the General tab and click “Selective startup”.
  • Clear the “Load Startup items” check box and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
  • Next, click the Services tab and select the “Hide All Microsoft Services” check box.
  • Click Disable all.
  • Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
  • Once your computer has restarted in a Clean Boot State, perform your scan again and see if it now works, and then start to isolate the problem by checking which one of the programs you installed recently is the root cause of the problem.
Read More
Fix Power surge on the USB port
USB ports, just like any other ports, also comes with a power rating. The default power output of a standard USB port is 0.5 amperes and if you notice, mobile phones charge slowly on USB ports which explains why. There are times when Windows may throw an error or warning that says, “Power surge on the USB port”. This kind of error occurs when a connected device tried to draw more power and the error comes as a part of that notification so when you select it, it will say,
“A USB device has malfunctioned and exceeded the power limits of its hub port. You should disconnect the device”.
To easily fix the problem, you can try to disconnect the device and click on Reset and if you click on Close, the port will not work until you unplug it and then restart your computer. On the other hand, if disconnecting the device did not resolve the problem, you can try running the Hardware & USB troubleshooter or use a USB hub. You can also try to reinstall, uninstall or roll back the USB drivers or run the OEM diagnostics. For more information, refer to each one of the potential fixes provided below.

Option 1 – Try to run the Hardware & USB troubleshooter

  • The first thing you need to do is click on Start and then on the gear-like icon to pull up the window for Settings.
  • After opening Settings, look for the Update and Security option and select it.
  • From there, go to the Troubleshoot option located on the left-hand side of the list.
  • Next, select Hardware and Devices from the list and open the Troubleshooter and run it. Once it is doing its job, wait for it to complete the process and then restart the system.
  • After the system restarts, check if the problem’s now fixed. If not, refer to the next option given below.
Note: You could also try to run the USB troubleshooter as it could also resolve the problem.

Option 2 – Try to use a USB hub

If you’ve encountered the error on a specific device, then it is possible that the device requires more voltage. To fix this error, you can try to use the same device on another computer and if you still got the same error, you might want to use a USB hub that comes with its power source. USB hubs come with high-speed charging ports that should be able to supply the power needed for the device.

Option 3 – Update, rollback or reinstall the Universal Serial Bus Controller driver

If updating the drivers of the device did not fix the “The device is not ready” error, you can try to update, rollback, or reinstall the Universal Serial Bus Controller drivers instead of using the Device Manager. Refer to the following steps:
  • First, click the Start button and type “device manager”.
  • Then click on the “Device Manager” from the search results to open it.
  • From there, look for the “Universal Serial Bus controllers” option and then right-click on each one of the USB drivers and select the Update Driver from the menu.
Note: If it is a regular USB drive, then it will be listed as a USB Mass Storage Device but if you have a USB 3.0 device, then look for a USB 3.0 Extensible Host Controller.
  • Restart your PC and then click the “Search automatically for updated driver software” option.
Note: If updating the USB Controller drivers didn’t work, you can try to reinstall them instead.

Option 4 – Try running OEM Diagnostics if you have any

If the laptop or desktop computer you are using is a branded one, OEMs usually include software to diagnose issues in the computer like the USB port error. So if you have this software, try to run it for diagnosis and use any given suggestions to fix the error.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status