Home Malware Programs Ransomware Ai88 Ransomware

Ai88 Ransomware

Posted: May 25, 2015

Threat Metric

Threat Level: 10/10
Infected PCs: 61
First Seen: May 26, 2015
Last Seen: March 1, 2023
OS(es) Affected: Windows

The Ai88 Ransomware is a file encryptor that may modify the files on your PC, holding them hostage for payment. As per the norm, the Ai88 Ransomware insists that paying its fee will restore your files to their ordinary, decrypted formats. However, malware experts offer a more dependable alternative: backing up your files and using anti-malware tools to solicit the Ai88 Ransomware's uninstallation. Despite the potential danger that the Ai88 Ransomware poses to files on your hard drive, the Ai88 Ransomware has not been found to include other, noteworthy attack features. Nonetheless, the Ai88 Ransomware should be assumed to be a threat to your PC's safety.

The Ransom Filled with 'Love'

The Ai88 Ransomware, which seemingly borrows its name from an unaffiliated Xin Net domain, is a file encrypting Trojan noted for its attacks against image files, such as GIFs and JPGs. However, other formats may be included in file encrypting attacks, such as MP3s, text files, Excel spreadsheets and Office documents. Regardless of the types of files attacked by the Ai88 Ransomware, they are rendered temporarily unreadable via a simple encryption function that restructures the files' internal data. In general, essential components of your applications aren't targeted by the above attack, although the Ai88 Ransomware also may block particular security programs (such as the ubiquitous Task Manager).

PC users who attempt to open files encrypted by the Ai88 Ransomware will view ransom instructions that request a payment for reversing the encryption process (a process referred to as decryption). Although this simple but illicit means of restoring your files may tempt some victims, malware experts discourage rewarding ill-minded persons for attacking your computer. The majority of ransomware-based threats like the Ai88 Ransomware fail to offer any genuine decryption services, although they may provide a 'sample' decryption of an individual file at no charge.

Although file encryptors and Trojans threatening similar attacks have been in circulation for years, the Ai88 Ransomware is a relatively recent example of a file encryption Trojan. Malware experts did manage to verify its compatibility with modern versions of Windows, including Windows 8.

Preserving Your Files from the Ai88 Ransomware in less than 88 Seconds

Remote file backups are one of the traditional and most readily available ways to block a file encryptor like the Ai88 Ransomware from harming your saved data. In circumstances where the Ai88 Ransomware already has encrypted files that are irreplaceable, you may wish to look into the third-party, freely-downloadable decryption utilities that are provided by various PC security organizations. Regardless of your response to the Ai88 Ransomware's attacks, removing the Ai88 Ransomware must be treated as a PC safety concern that merits the use of any favored anti-malware product available.

Many file encryptors also have various means of blocking other programs. For circumstances where the Ai88 Ransomware terminates the programs required for uninstalling the Ai88 Ransomware, malware experts advise following standard disinfection protocols. The latter can include restarting in Safe Mode or rebooting from a USB drive, after which scanning your PC should be your first concern.

Unfortunately, the investigation into the Ai88 Ransomware's delivery methodology is ongoing. For the time-being, malware experts have noted that residents of North America are more likely than other PC users to have the Ai88 Ransomware infections. However, there are few region-specific attributes to holding anyone's files for ransom.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\Program Files\Clearner\lib\v9d.exe File name: v9d.exe
Size: 25.37 MB (25378204 bytes)
MD5: d3206ba6fd5d27f66d45abe1e9a088d3
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Path: C:\Program Files\Clearner\lib
Group: Malware file
Last Updated: March 2, 2022
1.bin File name: 1.bin
Size: 11.81 MB (11813169 bytes)
MD5: 78177c46ae7665b94de672fcf0a26d8e
Detection count: 7
File type: Binary File
Mime Type: unknown/bin
Group: Malware file
Last Updated: March 1, 2023
Loading...