Logo

10 Worst Computer Viruses in history

Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.

viruses10 worst computer viruses in history

In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.

1. Mydoom – $38 billion

The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent.
Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server.

Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation.
Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught.
Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC

2. Sobig – $30 billion

The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging.
This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.

3. Klez – $19.8 billion

Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses.
As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last.
Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.

4. ILOVEYOU – $15 billion

The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs.
The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter.
Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely

5. WannaCry – $4 billion

The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch.
The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.

Ransomware strikes again

In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.

6. Zeus – $3 billion

The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries.
The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms.

Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.

7. Code Red – $2.4 billion

First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage.
Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red.
Can your printer get a virus? See our cool infographic: The State of Printer Security

8. Slammer – $1.2 billion

The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic.
The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.

9. CryptoLocker – $665 million

Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note.
The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million.
Where will cybersecurity go next? See our guide: The Future of Cybersecurity

10. Sasser – $500 million

The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack.
Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million.
Other notable viruses

The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years:

Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove.

Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India.

Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably.

Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather.

Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries.

Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.”

Explorezip: This worm used fake emails to spread to every machine on thousands of local networks.

Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million.

Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs.

Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates.

Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Best Browsers in 2021 with browser description
In today's digital life, when we access the internet daily, browsers are essential almost as our operating system, after all, we do access all of the internet data via them, and having a good, reliable, and personal browser tailored for our needs can make all the difference in the world. In today's article, we will introduce you to the five greatest browsers of today, we will point their advantages and disadvantages and why should you pick one or another. As with each piece of software, there is not an ultimate browser, better than anything else and we will not favor anyone on this list, the decision which you should use is solely up to you, we are here to provide you with an objective opinion on each one. All of this being said, let's begin with the countdown in no particular order.
  1. Mozilla firefox.

    firefox browser If you consider yourself a power user or you value your privacy then firefox is the browser for you. It is open source and is packed with great features like reporting when your email has been used for a known data breach, it stops annoying pop-up notifications, stops browser fingerprinting, and many more. Firefox is also a cross-platform browser making it a great choice if you want to transfer and use your data across multiple devices with one account. The downside of firefox however is its speed, this browser is the slowest on this list, I guess features and advantages took their tool in the speed department, but if that is not a concern for you and you feel like the positives outweigh some slower speed, grab it here.
  2. Google Chrome

    chrome browser Chrome browser has been a game-changer when it was released and even today some of its features are still great and needed. It is packed with some great features like tab freezing, for example, it is cross-platform meaning that also as firefox you can change data between browsers on different devices. it is a very expandable browser with tons of extensions and its speed performance is very very good. The downside of Chrome are two things sadly, one of them is its hunger for RAM, the browser takes a big chunk of RAM once it is active and on some older computer with limited RAM it performs slowly, another is telemetry which its sending, in other words, other browsers don’t come with the lingering fear that Google’s just a little bit too involved in all of our lives. But if downsides do not trouble you and you have a decent amount of RAM in your system chrome might be the best solution for you, grab it here and check it out.
  3. Microsoft Edge

    edge browser Or should I say Microsoft edge 2.0 since this new Edge is completely recoded and rethought, a completely new browser based on chromium. The first version of the edge was an inhouse attempt from Microsoft and it was a disaster, I guess the lesson was learned, and this new edge we have today is a great Browser, it is lightning fast and packed with some great features with one among them standing out I just love, that is the ability to save web pages as applications and truth to be told you have to try this in order to see al great advantages it offers. A very interesting feature is that edge itself wins the speed race from all of the 5 contestants here which is a great surprise. Of course, the downside of annoying Microsoft pushing it to be your default is, well it's Microsoft, as chrome is tied to Google so is edge tied to Microsoft, and the same dreaded feeling that big MS is watching you. If however, you do not concern yourself with these kinds of things, since it is already part of Windows 10, give it a spin and try it, I am sure you will at least love its blazing speed.
  4. Vivaldi

    vivaldi browser A new kid on the block, relatively unknown Browser Vivaldi offers some great customizable features no other one on this list offers, a very unique and down to each detail customization option, you can literally tweak each and every aspect of this browser making it best customizable and personal browser ever. How it is also based o chromium, every chrome extension works in it naturally. It is very good in speed and constantly updated and developed. The downside, well if you are anything like me, you could spend ages trying to customize it, ages, it has tons of features, and making it really feel and tick as you want can consume a really lot of time. If this thing does not bother you at all, grab Vivaldi here.
  5. Opera

    opera browser Last but not least, we have another relic of the old browser age, the Opera browser. Packed with great security and great in-house features like a built-in VPN, built-in ad blocker, built-in crypto wallet, etc this browser seems like a swiss army knife. Opera is full of features and it shows once you start using it. The downside of opera is that its look and feel are specifically tailored to a certain type of user and not everyone will find that appealing or attractive, add some great but hidden and hard to come by features and it may go unnoticed. However, I think you should really give it a go since it definitely deserves more attention than it gets. Grab it here and check it out.
That's it, 5 great browsers to look up, I hope that you have enjoyed the read and I hope to see you again here for more articles. If you would like to read more helpful articles and tips about various software and hardware visit errortools.com daily.
Read More
Alt-tab that is broken with KB5005033 update
Alt-tabLately, Microsoft has trying to fix Print Nightmare with various methods and patches. The last patch has seemingly fixed Print Nightmare but it has broken the Alt-tab key combination. It has been reported that the latest patch has broken famous key combinations for quickly switching from window to window. It seems that combination is not working or it is switching to desktop, even going to blank screen if switching from the full-screen game.

Fixing the issue

Luckily this issue is easily fixable. The first and easier fix for this issue is surprising to turn off the news and info widget, right-click on it and choose News and interests and then click on turn off. The second solution would be to uninstall the update. Go to Settings, then to Update & Security, and from there view Update History and remove the update.
Read More
NoteHomepage removal guide

NoteHomepage (by MyWay) is a browser extension that may be bundled with other free software that you download off of the Internet, or delivered via other advertising means. When installed NoteHomepage will set the homepage and search engine for your web browser to http://search.myway.com. While installing this extension will gather information from your browsing sessions, including website visits, clicked links, and sometimes even private information, that it later sends back to display unwanted ads into your browser. Several anti-virus scanners have marked this extension as a Browser Hijacker and are therefore not recommended to keep on your computer. It is considered potentially unwanted, and many users wish to remove it, so it is flagged for optional deletion.

About Browser Hijackers

Browser hijacking is a form of unwanted software program, usually a web browser add-on or extension, which then causes modifications in the web browser’s settings. Browser hijacker malware is developed for many different reasons. Generally, browser hijacking is utilized for earning advertising revenue from forced advert mouse clicks and site visits. Even though it might seem harmless, these tools are designed by malicious individuals who always look to take full advantage of you, so that they can earn money from your naivety and distraction. Some browser hijackers are programmed to make certain modifications beyond the browsers, like altering entries on the system registry and letting other malware further damage your machine.

Find out how to identify a browser hijack

Below are some signs and symptoms that suggest your browser has been hijacked: the home page of your browser is changed unexpectedly; your browser is constantly being redirected to adult websites; the default search engine is changed; you are getting browser toolbars you have never noticed before; never-ending pop-up advertisements show up and/or your web browser popup blocker is disabled; your web browser gets sluggish, buggy, crashes regularly; Inability to navigate to certain websites, particularly anti-malware and also other security software websites.

So how exactly does a browser hijacker infect a computer?

Browser hijackers might use drive-by downloads or file-sharing networks or an e-mail attachment in order to reach a targeted PC. They could also come from add-on programs, also called browser helper objects (BHO), web browser plug-ins, or toolbars. Browser hijackers sneak into your computer in addition to free software application downloads also that you unknowingly install alongside the original. A good example of some infamous browser hijackers includes Babylon, Anyprotect, Conduit, SweetPage, DefaultTab, Delta Search, and RocketTab, however, the names are regularly changing. Browser hijackers will affect the user’s web surfing experience severely, track the websites frequented by users and steal personal information, cause difficulty in connecting to the web, and eventually create stability problems, causing software programs and systems to crash.

Learn how to remove browser hijackers

Some hijackers can be removed by just uninstalling the corresponding freeware or add-ons through the Add or Remove Programs in the Windows control panel. But, many browser hijackers are difficult to get rid of manually. No matter how much you try to get rid of it, it might keep returning again and again. Additionally, manual removals demand in-depth system knowledge and thus can be a very difficult job for novices. Industry experts always suggest users remove any malicious software including browser hijacker with an automatic malware removal tool, which is easier, safer, and quicker than the manual removal method. Employ a PC optimizer along with your anti-malware software to solve various registry issues, remove computer vulnerabilities, and boost your computer performance.

Download the software in Safe Mode with Networking

If the malware is set to run immediately when Windows starts, stepping into safe mode may block the attempt. Just minimal required applications and services are loaded whenever you start your laptop or computer in Safe Mode. To launch your Windows XP, Vista, or 7 PCs in Safe Mode with Networking, follow the instructions below. 1) At power on, hit the F8 key before the Windows splash screen begins to load. This would invoke the “Advanced Boot Options” menu. 2) Select Safe Mode with Networking with arrow keys and press ENTER. 3) As soon as this mode loads, you should have an internet connection. Now, get the malware removal software you want by utilizing the web browser. To install the program, follow the directions in the installation wizard. 4) Immediately after installation, run a full scan and let the software remove the threats it discovers.

Switch over to an alternate browser

Some viruses may target vulnerabilities of a particular web browser that obstruct the downloading process. If you’re not able to download the anti-virus software program using Internet Explorer, this means malware is targeting IE’s vulnerabilities. Here, you need to switch to a different internet browser such as Firefox or Chrome to download the antivirus program.

Run anti-virus from a pen drive

To successfully get rid of the malware, you have to approach the problem of installing anti-malware software on the affected computer system from a different perspective. Adopt these measures to run the anti-virus on the affected computer system. 1) Download the anti-malware software on a virus-free computer. 2) Plug the USB drive into the clean computer. 3) Double click on the downloaded file to open the installation wizard. 4) Select flash drive as the location when the wizard asks you exactly where you wish to install the application. Follow the on-screen instructions to finish the installation process. 5) Remove the flash drive. Now you can utilize this portable anti-malware on the affected computer. 6) Double-click the anti-malware software EXE file on the USB drive. 7) Press the “Scan” button to run a full computer scan and remove viruses automatically.

Technical Details and Manual Removal (Advanced Users)

To eliminate NoteHomepage manually, navigate to the Add or Remove programs list in the Windows Control Panel and select the program you want to get rid of. For web browser plug-ins, go to your web browser’s Addon/Extension manager and choose the add-on you want to disable or remove. You might also want to reset your home page and search providers, as well as clear your web browser cache and cookies. Finally, check your hard disk for all of the following and clean your Windows registry manually to remove leftover application entries after uninstalls. Please be aware that this is for professional users only and could be challenging, with incorrect file removal resulting in additional PC errors. In addition to that, certain malware is capable of replicating or preventing deletion. You’re advised to do this procedure in Windows Safe Mode.
Files: C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Extensions\lamecoaceiheggdhlnjnmciaonfdamlg.600.11.14900_0 C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lamecoaceiheggdhlnjnmciaonfdamlg C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\lamecoaceiheggdhlnjnmciaonfdamlg C:\Users\%USERNAME%\AppData\Local\NoteHomepageTooltab C:\Users\%USERNAME%\AppData\Roaming\Mozilla\Firefox\Profiles\profile\extensions\[email protected] C:\Users\%USERNAME%\AppData\Roaming\Mozilla\Firefox\Profiles\profile\extensions\[email protected]\chrome C:\Users\%USERNAME%\AppData\Roaming\Mozilla\Firefox\Profiles\profile\extensions\[email protected]\META-INF C:\Users\%USERNAME%\AppData\Roaming\Mozilla\Firefox\Profiles\profile\notehomepage_j Registry: HKLM\SOFTWARE\Classes\AppID\NoteHomepage Toolbar.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\Extensions HKEY_CURRENT_USER\Software\Opera Software\Explorer\Main\Start Page Redirect=http://random.com HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NoteHomepage HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon Shell = %AppData%\IDP.ARES.Generic.exe HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Random HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Random. HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\NoteHomepageTooltab Uninstall Internet Explorer HKEY_CURRENT_USER\Software\NoteHomepage
Read More
How to Fix Error 118

Error 118 - What is it?

Error 118 is a typical Google Chrome error. It pops up when Google Chrome fails to load websites like Facebook. It is usually displayed in the following format:
‘Error Message: Error 118 (net::ERR_CONNECTION_TIMED_OUT): The operation timed out.’

Solution

Restoro box imageError Causes

Error 118 may be triggered due to several reasons. This includes:
  • Problems with DNS setting
  • IP Address is filtering websites
  • Cookies and invalid registry entries

Further Information and Manual Repair

To ensure smooth internet browsing on Google Chrome, it is advisable to repair the error 118. If error 118 is not resolved you will be unable to load and access your desired websites. To avoid inconvenience and resolve the issue immediately, try the methods suggested below. These are easy and effective do-it-yourself methods that require no technical skills.

Method 1 - Change Proxy Settings

If your IP address is filtering websites, then you might experience error 118 while using Google Chrome. When this is the error cause, then it is advisable to add a proxy for your PC. To change proxy settings and add a new proxy, simply click on Customize and Control Google Chrome menu. Now click the options button. Under the Google Chrome Options window select the Under the Hood tab. After that in the Network, section click the change proxy settings button. Check Show Suggestions for navigation errors and Use DNS pre-fetching to improve page load performance boxes. Now under Internet Properties, click LAN Settings. Under LAN settings you will see the Proxy Server box, check it, and enter your new proxy settings. Click OK to confirm and save settings. This will hopefully resolve the issue.

Method 2 - Change to Google DNS

When the error is related to DNS settings then try this method to resolve it. Simply set DNS to use Google DNS. Here’s how it’s done:
  1. Go to the start menu, click Windows Control Panel, Network and Internet, and change adapter settings. Here you will see Local Area Connection.
  2. Right click to select properties at the bottom.
  3. Check Internet Protocol Version 4 and click properties.
  4. Now check the ‘Obtain an IP address automatically’ box and also select the option that says ‘Use the following DNS server addresses’.
  5. Change Preferred DNS to 8.8.4.4 and Alternate DNS server to 8.8.8.8 now click OK to confirm.

Method 3 - Remove the Bad Entries and Cookies Damaging the Registry

Bad entries and cookies saved in the registry can also trigger error 118. To fix the issue immediately download Restoro. This is PC Fixer with multiple utilities including a registry cleaner. The registry cleaner removes all bad entries and cookies in seconds and repairs the damaged registry. Click here to download Restoro and resolve error 118.
Read More
Specified service does not exist, 0x80070424
Every now and then, the Windows Installer can also encounter some problems or glitches. One of these problems is where the Windows Update Standalone Installer, Windows Defender as well as Windows Firewall throws an error message that says, “The specified service does not exist as an installed service, 0x80070424”. This type of error can actually affect various applications on your computer so you have to fix it as soon as you can. Although there is no clear reason for what really causes this error, there are various suggestions you can try to fix it.

Option 1 – Try to run the Windows Update troubleshooter

Windows 10 have various troubleshooters that can help you resolve many system issues. So if you’re dealing with errors “The specified service does not exist as an installed service, 0x80070424”, you can run the Windows Update troubleshooter to resolve it. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.

Option 2 – Try to reconfigure the Windows Time Service

  • In the Start Search, type “command prompt” and right-click on Command Prompt from the search results.
  • Then click on the “Run as administrator” option to open Command Prompt with admin privileges.
  • Now execute each one of the given commands sequentially and hit Enter right after you type each one of them.
    • net stop W32time
    • exe /unregister
    • exe /register
    • net start W32time
  • After executing the given commands above, wait until it says, “W32Time successfully registered”.

Option 3 – Try to restart related Windows services

  • First, type “command prompt” in the Start Search and right-click on Command Prompt from the search results.
  • Then click on the “Run as administrator” option to open Command Prompt with admin privileges.
  • Now execute each one of the given commands sequentially and hit Enter right after you type each one of them.
    • SC config wuauserv start= auto
    • SC config bits start= auto
    • SC config cryptsvc start= auto
    • SC config trustedinstaller start= auto
Note: The commands you’ve just executed will make sure that the required Windows services are available.

Option 4 – Try to download and install the Windows Update Agent

You might also want to download and install the latest Windows Update Agent as it could also help you resolve the “The specified service does not exist as an installed service, 0x80070424” error.

Option 5 – Try to reset the Windows Update components

If by any chance that the second option didn’t work, resetting the Windows Update components could also help you resolve the problem. How? Refer to the following steps:
  • Open Command Prompt with admin privileges.
  • After that, type each one of the following commands and hit Enter after you key in one after the other.
    • net stop wuauserv
    • net stop cryptsvc
    • net stop bits
    • net stop msiserver
Note: The commands you entered will stop the Windows Update components such as Windows Update service, Cryptographic services, BITS, and MSI Installer.
  • After disabling WU components, you need to rename both the SoftwareDistribution and Catroot2 folders. To do that, type each one of the following commands below, and don’t forget to hit Enter after you type one command after the other.
    • ren C:WindowsSoftwareDistribution SoftwareDistribution.old
    • ren C:WindowsSystem32catroot2 Catroot2.old
  • Next, restart the services you’ve stopped by entering another series of commands. Don’t forget to hit Enter after you key in one command after the other.
    • net start wuauserv
    • net start cryptsvc
    • net start bits
    • net start msiserver
  • Close Command Prompt and reboot your PC and then check for updates on your computer and see if the error is resolved.

Option 6 – Try running the Windows Firewall troubleshooter

You could also try to run the Windows Firewall troubleshooter as it might also help you fix the problem. This could help in repairing and fixing Windows Firewall issues automatically. Check if it’s available for your Windows.
Read More
A Guide to Fixing Corefoundation.dll Error on Your PC

Corefoundation.dll Error - What is it?

Corefoundation.dll error is a DLL error code associated with Apple software such as iTunes, MobileMe, QuickTime and etc. To understand this error better, first you need to understand what corefoundation.dll file is. Corefoundation.dll is a Dynamic Link Library file that is used by Apple software products. This file is created by Apple computer Inc and is designed to help open up some of the media files that you might have on your PC. DLLs help promote modularization of code, efficient memory usage, code reuse and reduced disk space allowing the operating system and the programs to load and run faster and take less disk space on the computer.

Error Messages

This error pops on the screen when there is an issue related to Apple software products on your system. Corefoundation.dll error is displayed on the computer screen in any one of the following formats:
“The program can not start because corefoundation.dll is missing from your computer. Try reinstalling the program to fix this problem”. "This application has failed to start because CoreFoundation.dll was not found. Re-installing the application may fix this problem." “The procedure entry point_CFBundleCopyFileTypeForFileData could not be located in the dynamic link library corefoundation.dll.” "MobileMe Control Panel cannot continue as Apple Application Support is missing or outdated. Please uninstall and reinstall the latest version of iTunes and MobileMe Control Panel to fix this issue.”
Though this error code is not fatal but if it is not fixed immediately it will hamper your ability to load and run Apple programs on your system.

Solution

Restoro box imageError Causes

Corefoundation.dll error can be triggered due to several reasons. Here are some of the most common corefoundation.dll error causes:
  • Outdated PC drivers
  • Viral infection
  • Damaged Windows registry files
  • Corrupted corefoundation.dll file
  • Missing corefoundation.dll file
  • Incorrectly installed third-party software

Further Information and Manual Repair

To fix this issue on your computer here are some of the best, easy and quick do it yourself methods that you can try:

Method 1: Download the Original Corefoundation.dll File

If the underlying reason for corefoundation.dll error is file corruption or it goes missing, then the best way to resolve is to download the original corefoundation.dll file. Once you download it, paste it to its exact location. DLL files are normally located in the following location C:\Windows\System32. Once you paste it, register the file by typing ‘regsvr corefoundation.dll’ at the command prompt. When the process is complete, restart your PC to activate changes. Alternatively, you can uninstall and re-install any Apple Software you may have on your Windows Computer. To do that, Open the Control Panel, navigate to "Install/Uninstall a Program", search for Apple software, and uninstall them.

Method 2: Update Window Drivers

If the error code is related to outdated drivers, then it is recommended that you update them promptly to resolve the corefoundation.dll error on your PC. This can be done by using a driver update wizard from within Device Manager. The driver update wizard walks you through the entire drive update process, making updating a hassle-free process.

Method 3: Download Restoro

If the error still persists, then try method 3. Sometimes the cause of corefoundation.dll can be viral infection or registry issues.  Viruses may enter your PC unknowingly through phishing emails and downloads which can corrupt and damage your dll files. Also, if you don’t clean your registry frequently, unnecessary and obsolete files may accumulate in the registry like cookies, junk files, internet history and temporary files. These files take up a lot of disk space corrupt DLL files and lead to disk fragmentation. Regardless of what the issue is, Restoro is your one-stop PC Fixer. It is a multi-functional and user-friendly repair tool embedded with 6 different scanners including a registry cleaner and an antivirus. It scans and removes all types of viruses and cleans and restores the registry too. Click here to download Restoro and resolve the corefoundation.dll error today!
Read More
SettingSyncHost.exe High CPU usage
One of the important processes in the Windows operating system is the Setting Synchronization or SettingSyncHost.exe. This process is the one responsible for synchronizing the settings of your computer with other devices. It is the one that replicates settings like OneDrive, Internet Explorer, wallpapers, and so on, to other systems. However, it has been known to cause high CPU usage in Windows 10 and there are times when it causes the system to freeze or system lags. So if you notice that the SettingSyncHost.exe process is causing high CPU usage in your computer, worry not for this post will guide you in fixing them. You have to be cautious when you notice high CPU usages caused by system processes since cybercriminals mostly set the names of viruses in a way that the system or the user won’t be able to identify them. Cyber crooks could name the virus and malware the same as one of the system processes like SettingSyncHost.exe to make it seem like it’s a legitimate process. Thus, you need to keep in mind that original system processes like the SettingSyncHost.exe file are located in the System32 folder. The original SettingSyncHost.exe file is located in the System32 folder. To check for the same, right-click on the troublesome process in the Task Manager and select Open file location. If the place is any other than the System32 folder, run a full system anti-virus scan on the system. The SettingSyncHost.exe causes high CPU usage when it gets stuck in the sync process and is not able to come out of the loop. To fix this problem, you need to follow the solutions offered below but before you proceed, make sure that you create a System Restore point first.

Option 1 – Apply some registry tweak

The first thing you can do is to apply some tweaks to the Windows Registry. To get started, follow these steps:
  • Tap the Win + R keys to open the Run utility and type “Regedit” in the field and then tap Enter to open the Registry Editor.
  • Next, navigate to this registry path: HKEY_CURRENT_USERSoftwareMicrosoftInputPersonalizationTrainedDataStore
  • From there, right-click on the key and select Permissions.
  • After that, check the box next to “Allow” for Full Permission for every user group.
  • Now click on the Apply and OK buttons to save the changes made.
  • Then restart your computer.

Option 2 – Close the Host process for setting synchronization

If the registry tweak didn’t work, you can try to close the host process for setting synchronization, especially if this process continues to hog resources. You can terminate this process by opening the Task Manager. From there, end the process or task of the host process. On the other hand, you can also turn off the Host process for synchronization by opening Settings > Accounts > Sync settings located in the left pane. After that, turn off the Sync setting.

Option 3 – Run the Hardware and Devices Troubleshooter or the Performance Troubleshooter

Hardware and Devices Troubleshooter:

  • The first thing you need to do is click on Start and then on the gear-like icon to pull up the window for Settings.
  • After opening Settings, look for the Update and Security option and select it.
  • From there, go to the Troubleshoot option located on the left-hand side of the list.
  • Next, select Hardware and Devices from the list and open the Troubleshooter and run it. Once it is doing its job, wait for it to complete the process and then restart the system.
  • After the system restarts, check if the problem’s now fixed. If not, refer to the next option given below.

Performance Troubleshooter:

  • Tap the Win + R keys to open the Run dialog box.
  • Type “exe /id PerformanceDiagnostic” in the field and hit Enter to open the Performance troubleshooter.
  • Then click on Next to get started. Wait until the process is completed.

Option 4 – Try scanning your computer using Windows Defender

As mentioned, it is possible that the SettingSyncHost.exe could be infected with a virus or malware. To eliminate it, you have to scan your computer using security programs like Windows Defender.
  • Tap the Win + I keys to open Update & Security.
  • Then click on the Windows Security option and open Windows Defender Security Center.
  • Next, click on Virus & threat protection > Run a new advanced scan.
  • Now make sure that Full Scan is selected from the menu and then click the Scan Now button to get started.
Read More
Diagnosing your PC/Preparing Automatic Repair
Windows 10 is has a lot of features that help a user in optimizing a computer. So when the operating system encounters a problem, it is able to provide users with proper resources to get the problem fixed. There are even times when a user is not notified and an issue is either being repaired or dodged in the background. This kind of feature is known as the Diagnosis of the Automatic Repair feature that starts when your computer is booting. In such times, you will either see the “Diagnosing your PC” or “Preparing Automatic Repair” message on your screen. Although this feature is useful and has proven to be effective, some users reported that the process gets stuck. If you experience the same problem, read on as this post will guide you on what to do to fix it but before you start troubleshooting the problem, you might want to perform a Hard Boot first. All you have to do is to power down your computer, remove the battery and the AC adapter and then reconnect them. After that, tap and hold the power button for about 20 seconds and see if your computer boots up properly. If it doesn’t, follow the given fixes below.

Option 1 – Try disabling the automatic Startup Repair

The Automatic Startup Repair window will automatically open during boot when you have some system driver-related problem. So if you think that this is where the problem lies, you can try to disable the automatic Startup Repair.
  • Click on Troubleshoot and go to the Advanced options.
  • After that, select Command Prompt and execute the following command:
bcdedit /set recoveryenabled NO
  • Restart your computer after that and then check.

Option 2 – Run the System File Checker

System File Checker or SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files to good system files that might be the cause why you’re facing this problem. To run the SFC command, follow the steps given below.
  • Type “cmd” in the Start search and then right-click on the appropriate search result.
  • Next, select “Run as administrator” to open Command Prompt with admin privileges.
  • After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
  • Now restart your computer and see if the problem is fixed or not.

Option 3 – Run CHKDSK to check your disk for errors

When it comes to some issues concerning the hard drive or removable devices, there is a utility in Windows that might help which is called “chkdsk”. This error check utility can help with several issues in the system.
  • Tap the Win + S keys to open the Search box.
  • Then type “command prompt” in the field and from the search results that appear, right-click on Command Prompt and select “Run as administrator”.
  • After opening an elevated command prompt, copy and paste the following command and hit Enter:
chkdsk /r /f
  • Now if you are prompted to run CHKDSK after your reboot your computer, just tap Y and reboot your PC.
  • If CHKDSK is not able to find any errors, tap the Win + E keys and navigate the access window. From there, right-click on the concerned drive and click on Properties.
  • After opening Properties, click on the tab Tools and then click on the “Check” button under the Error-checking section.
  • Wait until the process is completed and then restart your computer.
  • Once your computer has restarted, try accessing the file and check if the error persists.

Option 4 – Run the DISM tool

The next thing you can do is run the DISM tool. This tool is known to repair potentially corrupted files in your system as having them could also system issues like your computer getting stuck in the “Diagnosing your PC” or “Preparing Automatic Repair” screen.
  • Tap the Win + X keys and click on the “Command Prompt (Admin)” option.
  • After that, input each one of the commands listed below sequentially to execute them:
    • Dism /Online /Cleanup-Image /CheckHealth
    • Dism /Online /Cleanup-Image /ScanHealth
    • Dism /Online /Cleanup-Image /RestoreHealth
  • Once you’ve executed the commands given above, restart your computer and check if the problem is now fixed.

Option 5 – Try to use installation media to boot and repair your computer

Another thing you can try to resolve the issue is to use the Windows installation bootable media so you can boot and repair the operating system. To use it, follow these steps:
  • You need to first create an installation media which has the dame version of the operating system installed in your computer.
  • After that, once you reach the Install Windows screen, click on the “Repair your computer” link.
  • Wait until the repair is completed and then shut down your computer
  • Now once your computer has restarted, check if it can now boot properly.
Read More
Fix System doesn’t have any USB boot option
Lately, some users reported getting an error that says, “System doesn’t have any USB boot option, Please select other boot option in Boot Manager Menu” when they tried to reinstall the Windows 10 operating system on their PCs or boot from an installation media. If you have the same problem, then this post should help. This kind of error is applicable to multiple devices by various OEMs and is mostly due to the Secure boot being enabled, or the Legacy or CSM support being disabled. It could also be that the bootable USB device was not correctly made and so on. Whatever the cause may be, here are some suggestions you need to check out to resolve the “System doesn’t have any USB boot option, Please select other boot option in Boot Manager Menu” error and reinstall Windows 10 successfully.

Option 1 – Disable the Secure Boot in the BIOS

Disabling the Secure Boot in the BIOS settings is definitely recommended to resolve the error. To disable Secure Boot, here’s what you have to do:
  • First, boot your computer into Windows 10.
  • Next, go to Settings > Windows Update. From there, check if there is anything that you have to download and install if you see any available updates. Usually, OEMs send and update the list of trusted hardware, drivers, and operating systems for your computer.
  • After that, go to the BIOS of your computer.
  • Then go to Settings > Update & Security > Advanced Startup options. If you click on Restart Now, it will restart your computer and give you all the advanced options.
  • Next, select Troubleshoot > Advanced Options. As you can see, this screen offers you further options including System restore, Startup repair, Go back to the previous version, Command Prompt, System Image Recovery, and UEFI Firmware Settings.
  • Select the UEFI Firmware Settings which will take you to the BIOS.
  • From there, go to the Security > Boot > Authentication tab where you should see Secure Boot. Note that every OEM has its own way of implementing the options so it varies.
  • Next, set Secure Boot to Disabled and set Legacy Support to On or Enabled.
  • Save the changes made and exit. Afterward, your computer will reboot.

Option 2 – Try to reset the BIOS or the UEFI Settings

If updating the BIOS didn’t help in fixing Error 0199, you can try to reset the BIOS instead.
  • Start your computer and tap the F10 key during the booting process to enter the BIOS. If it does not work, you can try tapping the F1 or F2 key as well as the Del key.
  • Once you’re already in the BIOS, tap the F9 key to get the prompt to RestoreLoad default configuration now for the BIOS.
  • Next, click on Yes and then follow the next on-screen instructions that appear to set the BIOS back to its default settings.
  • Once you’re done restoring the default settings of the BIOS, restart your computer and then check if it now boots properly.

Option 3 – Make a proper bootable USB Drive/Stick

To make a proper bootable USB drive, you need to use the Windows Media Creation tool. The Media Creation tool in Windows allows you to use the ISO installation file to make a bootable device that you can use to install Windows on your PC. Note that this is kind of different from the usual installation process as it could erase your computer’s current settings and data on the primary drive. Thus, before you proceed, you need to backup all your data into some removable drive and then use the Media Creation Tool to make a bootable drive.
  • After making the bootable drive, you need to plug it into your computer and then reboot.
  • Next, tap the F10 or Esc key to open the boot options.
  • Now set the boot priority of the removable drive the highest. Once the setup comes forth, follow the next onscreen instructions and install Windows without any problems.

Option 4 – Try enabling Legacy or CSM boot support

If the Legacy or CSM boot support is disabled, then it’s no wonder why you’re getting an error. Thus, you need to enable it by following these steps:
  • Open Settings and go to Update & Security > Advanced Startup options.
  • Next, click on Restart Now to reboot your computer.
  • After that, select Troubleshoot > Advanced Options where, you will see more options such as System Restore, Startup Repair, Go back to the previous version, Command Prompt, System Image Recovery, and UEFI Firmware Settings.
  • From there, enable Legacy Support and then save the changes and exit. This will restart the computer.
  • Once your computer has restarted, check if the error is now fixed.
Read More
MMC.exe has been blocked for your protection
When trying to run Computer Management, or when running mmc.exe or compmgmt.msc from a command prompt you get the error that the application has been blocked for your protection then keep reading in order to solve the issue. This is a permission issue where if a regular user tries to run such system tools will result in saying that it has been blocked. Along with this, you may have a Group Policy issue. This can be fixed, but you will need admin permission to achieve it. It’s because when they are run from the command prompt with elevated privileges, it works.
  1. Change Group Policy Settings

    If your account is an admin account, and you are still facing the issue, then change the group policy settings: Open Group Policy Settings by typing gpedit.msc in the run prompt followed by pressing ENTER Navigate to User Configuration > Administrative Templates > Windows Components > Microsoft Management Console > Restricted/Permitted snap-ins Locate Computer Management policy, and double click to open it Enable it, exit Group Policy. When Enabled: The snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. When Disabled: The snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that the policy is prohibiting the use of this snap-in.
  2. Temporarily disable UAC

    UAC is the user access control panel, and if you need to run the command right away, you can choose to disable it for some time. Click on the Start button, and then type UAC to find the User Account Control Settings. Click to open, and then slide down the notification setting at the bottom. It will temporarily allow launching the application as there is no check. However, make sure to switch to default once you are done.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status