.cryptes Files Virus – How to Delete It + Restore Files

.cryptes Files Virus – How to Delete It + Restore Files

This article has been created to explain what is the .cryptes file ransomware, how to remove it from your computer system and how you can restore .cryptes encrypted files.

Yet another mysterious ransomware infection has been discovered by security researchers. The virus aims to encrypt the files on the compromised computers with the main purpose of getting users to pay hefty ransom fee to the cyber-criminals who are behind this virus. The ransomware does this by dropping a ransom note, called HOW TO DECRYPT ALL MY FILES.txt in which the conditions of the extortion are made clear. If your computer has been infected by the .cryptes files virus, we recommend that you read this article. It will help you remove this ransomware virus from your computer and try to recover as many files with .cryptes extension as possible.

Threat Summary

Name.cryptes Files Virus
TypeRansomware, Cryptovirus
Short DescriptionAims to encrypt the files on your computer and then add a ransom note asking you to pay ransom to get the files back.
SymptomsFiles are encrypted with an added .cryptes file extension. A ransom note, called HOW TO DECRYPT ALL MY FILES.txt is dropped on the victim’s computer.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .cryptes Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .cryptes Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.cryptes Files Virus – Update August 2018

In August, 2018 .cryptes Files Virus continues to infect computer systems across the World. The latest victims are reported to be from Poland and Italy. The most current malware sample can be seen on the screenshot below:

As you can see above, the VirusTotal service shows detections of the payload file, which has the name RegIstry.exe.

Note the following registry key:

  • “%APPDATA%\Windows Defender\Monitors.exe”

That key is being set in the Windows Registry under the path of:

\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender

Nothing new can be said for the activity of the .cryptes Files Virus, other than victims from various countries are reporting to have their computer files encrypted by this malware threat.

.cryptes Files Virus Distribution

The main infection method of the .cryptes ransomware is conducted based on various different types of activities, the main goal of which is to trick the victim into downloading and running the infection file of the virus that drops the payload files.

One such activity is to send you spam e-mails that contain a maicious e-mail attachment embedded within them. These e-mails may appear like the following:

In addition to e-mail, the infection with the .cryptes ransomware may also be conducted via other methods as well, like being uploaded online while pretend to be a legitimate type of file, from the likes of:

  • Fake setup of program.
  • Fake software activator.
  • Fake crack or patch.
  • Fake keygen (key generator).

.cryptes Files Virus – More Information

Once the .cryptes files virus has infected your computer, the malware may drop it’s payload files. The files may reside in the following Windows directories:

  • %AppData%
  • %Windows%
  • %SystemDrive%
  • %ProgamFiles%
  • %System%
  • %Temp%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %UserProfile%

Once the payload of this ransomware has been dropped, the malware may being to check if your computer has previously been infected by it. If so or if the .cryptes virus is running in a virtual environment, then it shuts down and deletes itself plus does not encrypt any files.

But if not, the .cryptes virus may modify the Windows Registry Editor of the victimized computer, prefferably by creating entries in the Run and RunOnce registry sub-keys:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

In addition to this, the .cryptes ransomware may also delete the shadow volume copies of the infected computers by it, by possibly executing the vssadmin, bcedit and other commands in the Windows Command Prompt as an administrator without giving any chance to victims to stop the deletion.

The .cryptes virus also drops it’s ransom note, called HOW TO DECRYPT ALL MY FILES.txt and having the following ransom note:

All your files have been encrypted!

All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail: dekode@qq.com

In case of no answer in 24 hours write us to theese e-mails: supdecrypt@foxmail.com or supportdecryption@cock.li

You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files.
Free decryption as guarantee
Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 10Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)

How to obtain Bitcoins
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click ‘Buy bitcoins’, and select the seller by payment method and price.
Also you can find other places to buy Bitcoins and beginners guide here:

Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

The ransom note contains instructions on how to pay BitCoin via Coindesk or Localbitcoisn and then send it to the cyber-criminals. The crooks even offer to decrypt up to 5 files for free as a guarantee that paying the ransom will work. Nonetheless paying the ransom to the crooks behind the .cryptes virus is strongly inadvisable, because you aid the crooks and there is no guarantee that after paying they won’t demand more money and continue the extortion process.

.cryptes Virus – How Does It Encrypt

The .crypted file ransowmare may initially scan your computer for the file types It wishes to render no longer openable. The .cryptes virus encrypts files, based on their file extensions, and the malware looks for file extensions associated with the following logical groups of files;

  • Audio files.
  • Video files.
  • Image files.
  • File types, associated with documents used by different programs.
  • Backup file typtes.
  • Database files.
  • File types used by often downloaded programs.
  • Archive file types.

After the encryption process has already finished, the ransomware virus may add the .cryptes file extension to the encrypted files, making them appear like the following:

Remove .cryptes Files Virus and Restore Files

To remove this ransomware virus completely from your computer system, it is strongly reccomended to follow the removal instructions underneath. They have been made so that they aid you in deleting the .cryptes file ransomware either manually or automatically. If manual removal does not seem to be working for you or you lack the experience in deleting this virus manually, experts recommend to turn to a more automated solution. One such solution is to use an advanced anti-malware software, that aims to detect and remove all of the files, related to this ransomware variant completely plus make sure that your computer is protected against future infections as well.

If you want to restore files that have been encrypted by the .cryptes virus, we recommend that you try the alternative methods for file recovery underneath in step “2. Restore files, encrypted by .cryptes Files Virus”. They have been created to help restore as many encrypted files as possible without actually having to pay ransom, although they are not a complete solution to this issue.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share