Remove CryptoBubble Ransomware – Restore .Bubble Files

Remove CryptoBubble Ransomware – Restore .Bubble Files

This article will aid you in removing the CryptoBubble ransomware fully. Follow the ransomware removal instructions provided at the bottom.

CryptoBubble is the name of a ransomware virus written in C# (MSIL). Some malware researchers believe that it originates from Italy. Your files get encrypted while having the extension .bubble appended to them. A ransom note appears in the form of a legitimate Windows error notification. The cybercriminals demand that you contact them by e-mail. Keep on reading below and find out what ways you could try to potentially recover some of your files.

Threat Summary

Short DescriptionThe ransomware encrypts files on your computer system with the DES algorithm, while it is written in C#.
SymptomsThis ransomware virus encrypts your files with the extension .bubble and demands that you contact the cybercriminals for paying a ransom to get them recovered.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by CryptoBubble


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss CryptoBubble.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

CryptoBubble Ransomware – Ways of Delivery

CryptoBubble ransomware could be delivered in more than one way. However, the way that is the most widespread is via a payload dropper file which initiates the malicious script for the ransomware. A sample with the file executable preventivo.pdf.exe has been spotted by malware researchers and you can preview its analysis available on the VirusTotal service from down here:

The CryptoBubble ransomware might be using other ways to deliver the payload file, such as social media and file-sharing sites. Freeware applications found on the Internet could be promoted as helpful but also could hide the malicious script for this virus. Before opening any files after you have downloaded them, you should instead scan them with a security program. Especially if they come from suspicious places, such as emails or links. Also, don’t forget to check the size and signatures of such files for anything that seems out of place. You should read the ransomware prevention tips given in the forum.

CryptoBubble Ransomware – More Information

The CryptoBubble ransomware is a cryptovirus, which has been coded in C# (MSIL). CryptoBubble ransomware will pop up a window that serves as a ransom note with instructions, after it encrypts files on several locations on your PC. Malware researchers believe it originates from Italy.

CryptoBubble ransomware is set to make new registry entries in the Windows Registry to achieve a higher level of persistence. One of those entries is designed in a way that will start the virus automatically with every launch of the Windows Operating System, as clearly seen below:

→HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run [preventivo.pdf] = %path%\preventivo.pdf.exe

The ransom message will load up inside a legitimate looking Windows error notification pop-up as it can be seen in the below snapshot:

That text seen above is in actuality the full ransom note and it states:

Hello, I am Bob, do you remember the game? Unfortunately, the world has changed and I have changed too: once spit bubbles, today i encode your file! :)
Well, if you want to recover your files, please contact us at ‘’ and we will find a solution and will promptly send you the unlock key to retrieve all your files… Good Lucky

The following e-mail addresses are left for contact:


The ransom sum that is demanded as payment for allegedly restoring your files is unknown. The ransomware does not seem that dangerous and there is no reason to contact its creators as you will see below. The ransomware is decryptable and if you pay the criminals you can only motivate them further to indulge in similar criminal activity.

CryptoBubble Ransomware – Encryption Process

CryptoBubble ransomware seeks to encrypt files with various extensions in different folders of your computer system. The following folders will have all important files inside them encrypted:

  • MyPictures
  • Personal
  • MyVideos
  • MyMusic
  • DesktopDirectory

The files that have the following extensions will get encrypted:

→.3gp, .ac3, .accdb, .accdt, .avi, .bmp, .cdr, .csv, .DivX, .doc, .docm, .docx, .dwg, .jpeg, .jpg, .mid, .mov, .mp3, .mp4, .mpeg, .mpg, .odb, .odf, .odg, .odp, .ods, .odt, .ogg, .ogv, .otg, .otp, .ott, .pdf, .png, .rar, .tiff, .txt, .wav, .xls, .xlsm, .xlsx, .zip

Extension list and encryption information source:

All files that get encrypted will be deleted, copied with their original names and appended the .bubble extension. The encryption algorithm DES is used for locking the files and that is pretty mild compared to ransomware viruses nowadays. Thus, the CryptoBubble ransomware is actually decryptable.

The CryptoBubble cryptovirus is not set to erase the Shadow Volume Copies from the Windows Operating System, so you could actually restore your files partially or to a full extent using that Windows feature. Also, there are online decryptors of DES text over the Internet which could be of help, especially if you know that the first 50 lines of each encrypted file contain the following text:

→bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble…
bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble…
bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble…

Inputting that text into an online DES dectyptor might give you the actual unlock key that is mentioned in the ransom note. If you want to try such a manipulation yourself, first make copies of your files. Otherwise, you can continue reading and see what else you can try to restore your files and remove the virus so it stops running and encrypting your data.

Remove CryptoBubble Ransomware and Restore .Bubble Files

If your computer got infected with the CryptoBubble ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.


Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share