How to Remove Sage Virus

How to Remove Sage Virus

What is Sage Virus?

Sage virus is ransomware that encrypts personal files and appends the .sage file extension to the end of each files it encrypts.

REMOVE SAGE VIRUS NOW!

 

Table of Contents

Overview

Names Distribution
Sage virus, Sage ransomware Email, Exploit Kits, Social Media

Sage is predominantly distributed by malicious emails that contain deceptive links or attachments. The email attachments or files downloaded by the links will typically consist of a.zip file or fake Microsoft Word document file. If files from the .zip file are manually extracted it will unpack a file such as a JavaScript file. When the JavaScript file is manually executed by the user or another file is opened it will cause the malware to spread across the machine.

Targeted File Extensions

.mid, .wma, .flv, .mkv, .mov, .avi, .asf, .mpeg, .vob, .mpg, .wmv, .fla, .swf, .wav, .qcow2, .vdi, .vmdk, .vmx, .gpg, .aes, .ARC, .PAQ, .tar.bz2, .tbk, .bak, .tar, .tgz, .rar, .zip, .djv, .djvu, .svg, .bmp, .png, .gif, .raw, .cgm, .jpeg, .jpg, .tif, .tiff, .NEF, .psd, .cmd, .bat, .class, .jar, .java, .asp, .brd, .sch, .dch, .dip, .vbs, .asm, .pas, .cpp, .php, .ldf, .mdf, .ibd, .MYI, .MYD, .frm, .odb, .dbf, .mdb, .sql, .SQLITEDB, .SQLITE3, .asc, .lay6, .lay, .ms11 (Security copy), .sldm, .sldx, .ppsm, .ppsx, .ppam, .docb, .mml, .sxm, .otg, .odg, .uop, .potx, .potm, .pptx, .pptm, .std, .sxd, .pot, .pps, .sti, .sxi, .otp, .odp, .wks, .xltx, .xltm, .xlsx, .xlsm, .xlsb, .slk, .xlw, .xlt, .xlm, .xlc, .dif, .stc, .sxc, .ots, .ods, .hwp, .dotm, .dotx, .docm, .docx, .DOT, .max, .xml, .txt, .CSV, .uot, .RTF, .pdf, .XLS, .PPT, .stw, .sxw, .ott, .odt, .DOC, .pem, .csr, .crt, .key, wallet.dat

This ransomware encrypts files that match certain file extensions with RSA-2048 and AES-128 ciphers. The encryption process will render the files inaccessible to the user one successful. The files encrypted by the virus are given the .sage file extension and SAGE file type, and the file name will become randomized or given a pattern such as [unique_id][identifier].sage. Ransom notes named !Recovery_[6_random_characters].html and !Recovery_[6_random_characters]_.txt will then be placed in every folder the virus encrypted files in and on Windows desktop. In addition, Windows desktop or wallpaper will change to an image of the ransom note and an image file of the ransom note will also be left in every folder the virus encrypted files in.

Screenshot

sage virus

Ransom Note Example

Not your language? Use hxxps://translate.google.com
WARNING!
YOUR DOCUMENTS, DATABASES, PROJECT FILES, AUDIO AND VIDEO CONTENT AND OTHER CRITICAL FILES HAVE BEEN ENCRYPTED WITH A PERSISTENT MILITARY-GRADE CRYPTO ALGORITHM
How did this happen?
Specially for your PC was generated personal 4096 bit RSA key, both public and private. All your files have been encrypted with the public key. Decrypting of your files is only possible with the help of the private key and de-crypt program.....
What do I do?...
Don't wait for a miracle and the price doubled!Start obtaining Bitcoin now and restore your data easy way! If you HAVE REALLY VALUABLE DATA, you better NOT WASTE YOUR TIME, because there is NO OTHER WAY to get your files, EXCEPT MAKE A PAYMENT.Your personal ID:..
For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below:
1 - hxxp://qbxeaekvg7o3lxnn.onion.to
2 - hxxp://qbxeaekvg7o3lxnn.onion.cab
3 - hxxp://qbxeaekvg7o3lxnn.onion.city
What should you do with these addresses?
1. Take a look at the first address (in this case it is
hxxp://qbxeaekvg7o3lxnn.onion.to);
2. Select it with the mouse cursor holding the left mouse button and
moving the cursor to the right;
3. Release the left mouse button and press the right one;
4. Select "Copy" in the appeared menu;
5. Run your Internet browser (if you do not know what it is run the
Internet Explorer);
6. Move the mouse cursor to the address bar of the browser (this is the place where the site address is written);
7. Click the right mouse button in the field where the site address is written;
8. Select the button "Insert" in the appeared menu;
9. Then you will see the address hxxp://qbxeaekvg7o3lxnn.onion.to appeared there;
10. Press ENTER;
11. The site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.If for some reason the site cannot be opened check the connection to the Internet. Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available:
1. Run your Internet browser (if you do not know what it is run the Internet Explorer);
2. Enter or copy the address hxxps://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER;
3. Wait for the site loading;
4. On the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 
5. Run Tor Browser;
6. Connect with the button "Connect" (if you use the English version);
7. A normal Internet browser window will be opened after the initialization;
8. type or copy the address hxxp://qbxeaekvg7o3lxnn.onion in this browser address bar;
9. Press ENTER;
10. The site should be loaded; if for some reason the site is not loading wait for a moment and try again
!!! IMPORTANT !!!
Be sure to copy your personal ID and the instruction link to your notepad not to lose them.

Wallpaper Note Example

ATTENTION!
Sage encrypted all your files!
All your files, images, videos, and databases were encrypted and made inaccessible by software known as Sage.
You have no chance to restore the files without our help. But if you follow our instructions files can be restored easily. Instructions on how to get your files back are stored on every disk, in your documents and on your desktop. Look for files !Recovery_47UdPQ.txt and !Recovery_47UdPQ.html If you can’t find files, use the program “Tor Browser” (you can find it in Google) to access to (onion) web site http://qbxeaekvg7o3lxnn.onion to get your instructions.

The ransom note left on the computer by this ransomware contains information about what happened to the files, links to pages on Wikipedia, and steps to download and install Tor Browser in order to visit a web address and pay a ransom.

It is suggested to avoid paying ransomware authors to decrypt your files. Instead, third-party programs Shadow Explorer, PhotoRec, or Recuva can be used to potentially recover files encrypted by this virus. A user may also be able to retrieve encrypted files by performing a system restore to a date and time before the infection occurred.

Removal Software

Name Detection Download
Malwarebytes Anti-Malware Ransomware Download (Free) | Buy
HitmanPro by Surfright Ransomware Download (Free)

Decryption Software

Decryption Software

File Recovery Software

Name Description Download
Shadow Explorer Restores lost or damaged files from Shadow Copies Download (Free)
Photorec Recovers lost files Download (Free)
Recuva Recovers lost files Download (Free) | Buy

Troubleshoot

Alternative methods are suggested if there are issues removing Sage ransomware from an infected computer.

How to Restore your computer

If a restore point has previously been established on your machine you will be able to perform a system restore in order to restore your machine to a date and time before it was infected. You will lose files on your computer that were obtained prior to the restore point.

There are several options to restore your computer. Most computers have their own restore software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default restore program that can also be found by performing a search.

A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.

How to Recover your computer to factory settings

A system recovery (or reset) will recover your computer to factory settings. You will lose the current programs and files on your computer.

There are several options to recover your computer to factory settings. Most computers have their own recovery software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default recovery program that can also be found by performing a search.

A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.

How to Remove Popcorn Time Virus

How to Remove Popcorn Time Virus

What is Popcorn Time Virus?

Popcorn Time virus is ransomware that encrypts files, and appends the “.kok” or “.filock” file extensions to the end of each files it encrypts.

REMOVE POPCORN TIME NOW!

 

Table of Contents

Overview

Names Distribution
Popcorn Time virus, Popcorn Time ransomware Email, Exploit Kits, Social Media

The Popcorn Time virus is ransomware that is predominantly distributed by malicious email messages that contain deceptive links or malicious attachments. The malicious email attachments are usually a.zip file or fake Microsoft Word document file. If files from the .zip file are manually extracted it will unpack another file such as a JavaScript file. When the JavaScript file is manually executed by the user it will cause the malware to spread across the machine and enter the encryption process.

Targeted File Extensions

.mid, .wma, .flv, .mkv, .mov, .avi, .asf, .mpeg, .vob, .mpg, .wmv, .fla, .swf, .wav, .qcow2, .vdi, .vmdk, .vmx, .gpg, .aes, .ARC, .PAQ, .tar.bz2, .tbk, .bak, .tar, .tgz, .rar, .zip, .djv, .djvu, .svg, .bmp, .png, .gif, .raw, .cgm, .jpeg, .jpg, .tif, .tiff, .NEF, .psd, .cmd, .bat, .class, .jar, .java, .asp, .brd, .sch, .dch, .dip, .vbs, .asm, .pas, .cpp, .php, .ldf, .mdf, .ibd, .MYI, .MYD, .frm, .odb, .dbf, .mdb, .sql, .SQLITEDB, .SQLITE3, .asc, .lay6, .lay, .ms11 (Security copy), .sldm, .sldx, .ppsm, .ppsx, .ppam, .docb, .mml, .sxm, .otg, .odg, .uop, .potx, .potm, .pptx, .pptm, .std, .sxd, .pot, .pps, .sti, .sxi, .otp, .odp, .wks, .xltx, .xltm, .xlsx, .xlsm, .xlsb, .slk, .xlw, .xlt, .xlm, .xlc, .dif, .stc, .sxc, .ots, .ods, .hwp, .dotm, .dotx, .docm, .docx, .DOT, .max, .xml, .txt, .CSV, .uot, .RTF, .pdf, .XLS, .PPT, .stw, .sxw, .ott, .odt, .DOC, .pem, .csr, .crt, .key, wallet.dat

This ransomware encrypts files that match certain file extensions with RSA-2048 and AES-128 ciphers. The encryption process will render the files inaccessible to the user. The encrypted files are appended the new file extension and file type, and the file name will become randomized or given a pattern such as [unique_id][identifier].kok or [unique_id][identifier].filock. A ransom note (or series of ransom notes) named restore_your_files.html (or other) will then be dumped in every folder the virus encrypted files in and on Windows desktop. In addition, Windows desktop will change to an image of the ransom note and an image file of the ransom note will also be left in every folder the virus encrypted files in.

Screenshot

popcorn time virus

Ransom Note Example

Warning Message!!
We are sorry to say that your computer and your files have been encrypted, but wait, don’t worry. There is a way that can restore your computer and all of your files. When countdown ends your files will be lost forever.
You must send at least [AMOUNT] Bitcoin to our wallet and your will get your files back.
Your personal unique ID: -
Send [AMOUNT] BTC to this address:
Warning Message!!
********************
We are sorry to say that your computer and your files have been encrypted,
but wait, don’t worry. There is a way that you can restore your computer and all of your files.
****************************************************************************************************
Your personal unique ID: -
You must send at least - Bitcoin to address - to get your files back
Warning! ! ! If you will not pay for the next 7 days, the decryption key will be deleted and your files will be lost forever.
****************************************************************************************************
Restoring your files - The fast and easy way
To get your files fast, please transfer - Bitcoin, to our wallet -. When we will get the money we will immediately give your your private decryption key. Payment should be confirmed in about 2 hours after payment made.
Restoring your files - The nasty way
Send the link - below to other people, if two or more people will install this files and pay, we will decrypt your files for free.
What we did?
We had encrypted all of your important images, document, videos and all other files on your computer. We used a very strong encryption algorithm that used by all governments all over the world. We store your personal decryption code to your files on our servers and we are the only ones that can decrypt your files. Please don’t try to be smart, anything other than payment will cause damage to your files and the files will be lost forever! ! ! If you will not pay for the next 7 days, the decryption key will be deleted and your files will be lost forever.
What we do that?
We are a group of computer science students from Syria, as you probably know Syria is having bad time for the last five years. Since 2011 we have more the half million people died and over 5 million refugees. Each member of our team has lost a dear from his family. I personally have lost both my parents and my little sister in 2015. The sad part is that the world remained silent and no one helping us so we decided to take an action.
How to buy Bitcoins?
If you aren’t familiar with Bitcoin and don’t know what is it. Please visit the official Bitcoin website (https://bitcoin.org/en/getting-started), follow the steps and you’ll get your Bitcoins. To understand more you can check also on the FAQ page (https://bitcoin.org/en/faq). Please check this website (https://coinatmradar.com) where you can find Bitcoin ATM all over the world.
List of encrypted files on your computer -

It is suggested to avoid paying ransomware authors to decrypt your files. Instead, third-party programs Shadow Explorer, PhotoRec, or Recuva can be used to potentially recover files encrypted by this virus. A user may also be able to retrieve encrypted files by performing a system restore to a date and time before the infection occurred.

Removal Software

Name Detection Download
Malwarebytes Anti-Malware Ransomware Download (Free) | Buy
HitmanPro by Surfright Ransomware Download (Free)

Decryption Software

Decryption Software

File Recovery Software

Name Description Download
Shadow Explorer Restores lost or damaged files from Shadow Copies Download (Free)
Photorec Recovers lost files Download (Free)
Recuva Recovers lost files Download (Free) | Buy

Troubleshoot

Alternative methods are suggested if there are issues removing Popcorn Time ransomware from an infected computer.

How to Restore your computer

If a restore point has previously been established on your machine you will be able to perform a system restore in order to restore your machine to a date and time before it was infected. You will lose files on your computer that were obtained prior to the restore point.

There are several options to restore your computer. Most computers have their own restore software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default restore program that can also be found by performing a search.

A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.

How to Recover your computer to factory settings

A system recovery (or reset) will recover your computer to factory settings. You will lose the current programs and files on your computer.

There are several options to recover your computer to factory settings. Most computers have their own recovery software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default recovery program that can also be found by performing a search.

A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.

How to Find Your PC Info (Windows)

How to Find Your PC Info (Windows)

Your computer’s PC info contains specifications about your computer. Your PC info tells you your Product ID, Processor, Installed RAM, System type, Pen and touch availability, Windows Edition, Windows Activation, and more. Some PC info pages will additionally contain links to the manufacture’s support website and consists of other similar information.

1. Go to Windows Start screen

search pc settings

2. Go to PC Settings or search for the term “PC settings” to locate your PC settings

pc and devices

3. In the PC settings tab select PC and devices

PC info

4. In the PC and devices tab select PC info

5. The PC info page will tell you the specifications of your computer and allow you to change your product key and rename your PC

 

How to Change Account Picture (Windows)

How to Change Account Picture (Windows)

3 Solutions: From Windows Start Screen  |  From User Settings  | From Windows Control Panel

Your Windows account picture has multiple uses. It is used by applications and is shown on Windows Sign in and Star screens. The account picture is also used for email messages and will be shown to recipients of email messages you send from your account. Windows will display a default gray picture if you have not chosen an account picture. To change your Microsoft Windows account picture follow the instructions below.

From Windows Start Screen

1. Go to Windows Start screen

change account picture

2. Click on your default image or name on the top of the Start screen and select “Change account picture

your account

3. In the Your Account tab click the Browse button in the Account picture section

choose image

4. Browse OneDrive, This PC, Homegroup, and Network for the image you want to use as your account picture, select it with your mouse, and click the “Choose Image” button

From User Settings

1. Go to Windows Start screen

search users

2. Search for the term “Users” and select the Add, delete, and mange other user accounts option

account picture

3. Select “Your account” in the Accounts tab

4. In Your Account, click the Browse button in the Account picture section

5. Browse OneDrive, This PC, Homegroup, and Network for the image you want to use as your account picture, select it with your mouse, and click the “Choose Image” button

From Windows Control Panel

1. Go to Windows Control Panel

user accounts and family safety

2. Click User Accounts and Family Safety

user accounts

3. Click User Accounts

make changes to my account in pc settings

4. Click Make changes to my account in PC settings

5. Click the Browse button in the Account picture section

6. Browse OneDrive, This PC, Homegroup, and Network for the image you want to use as your account picture, select it with your mouse, and click the “Choose Image” button