Parisher Ransomware Remove and Restore Encrypted Files - How to, Technology and PC Security Forum |

Parisher Ransomware Remove and Restore Encrypted Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

parisher-ransomware-ransom-note-sensorstechforumImage Source:
Users on security forums and system administrators have complained about new “Parisher” ransomware that attacks primarily archives amongst other files it encrypts. The virus aims to render all files no longer usable by encrypting them after which use those files to extort the user to contact the e-mail of the hacker – The virus drops a key file suggesting that this is the public key file used in notorious algorithms, such as RSA or AES ciphers. Not only this, but the virus drops it’s ransom note on encrypted servers in the form of weird 1NFORMATI1ONFOR.YOU file. Anyone who has been infected by Parisher Ransomware is strongly advised to immediately remove the virus and attempt alternative methods to restore the files such as the ones mentioned in this article.

Threat Summary

Short DescriptionThe ransomware encrypts files with strong ciphers and asks a ransom for decryption.
SymptomsFiles are encrypted and become inaccessible. No extension is added. The virus may target primarily servers and their archives.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by Parisher


Malware Removal Tool

User ExperienceJoin our forum to Discuss Crysis Ransomware.
Data Recovery ToolStellar Phoenix Data Recovery Regular Version Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Parisher Ransomware How Is It SpreadParisher Ransomware How Is It Spread

For Parisher ransomware virus to infect the maximum amount of users, the virus may utilize a sophisticated combination of tools and spreading methods. Believed to be a variant of the notorious Mobef ransomware, the Parisher virus is believed to be spread in two primary ways:

  • Spam e-mail attachments being sent out to users and cause infection upon opening without being detected.
  • URLs that are posted on social media and aim to cause redirects to malicious drive-by web links once they are opened.

Parisher Ransomware – More Information

As soon as this ransomware virus has infected users’ computer, it could start to create files that are malicious and conceal them via process obfuscators in different Windows folders. The files may be different file types:

.exe, .tmp, .dll, .cmd, .bat, .vbs

They may also be existing under different names, most commonly names resembling legitimate Windows programs such as “notepad.exe” or “svchost.exe”. The usually targeted folders for this are:

  • %AppData%
  • %Roaming%
  • %Local%
  • %SystemDrive%
  • %UserProfile%

After having infected the user, Parisher may delete all of it’s shadow volume copies that create a file history via the vssadmin command:


After performing this, the Parisher virus may create a custom value string in the “Run” or “RunOnce” registry keys:


The objective of those value strings is to begin looking for several different file extensions, primarily associated with programs that are often used.

Once the virus has discovered those file extensions, it will begin to encode files. These files are then enciphered with the sole purpose to no longer be opened. Unlike Mobef Ransomware, on which this virus is most likely based on, the encrypted files by this virus are primarily archives, and they do not have any file extension appended to them.

After encryption, this ransomware drops a note on a file that is named “1NFORMAT1ONFOR.YOU”. The note has the following content:

Hello there. I can decrypt your files.
Email me:
In case you don’t get a reply, please email me here*:,,
* check your junk/spam folder first though :-)MM
These files have been encrypted (please, keep this .log): C:\Windows\7459374.log”

Remove Parisher Ransomware and Restore Your Files

In case you are interested in removing Parisher completely from your computer, we have provided instructions below which will assist in the complete deletion of this virus. If you are inexperienced in doing so, it is strongly advisable to use an advanced anti-malware program that will ensure the successful removal of the virus from your computer.

Not only this, but Parisher ransomware’s files cannot be directly decrypted as well. This is why we have also suggested alternative file restoration methods which are not 100 percent guaranteed to succeed but could save you a great deal of time if you are successful. Also, make sure to perform a system backup before trying those methods.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share