Remove Crysis Ransomware and Restore .CrySiS Encrypted Files - How to, Technology and PC Security Forum |

Remove Crysis Ransomware and Restore .CrySiS Encrypted Files

shutterstock_271501652A new ransomware has emerged. Its name is Crysis, and it sets the extension .CrySiS to encrypted files. RSA algorithm and AES ciphers are combined for the encryption process. The ransom note is set as a picture on the desktop background. To remove this ransomware and see how you can try to restore your files, you should read the article carefully.

UPDATE! Kaspersky malware researchers have released a Shade decryptor which can decode files encoded by the the Shade ransomware variants. Since this includes the .xtbl file extension, we have created instructions on how to decrypt your .xtbl files. The instructions can be found on the link below:
Decrypt Files Encrypted by Shade Ransowmare

Threat Summary

NameCrysis Ransomware
Short DescriptionThe ransomware encrypts files with the RSA algorithm and AES-128 ciphers and asks a ransom for decryption.
SymptomsFiles are encrypted and become inaccessible. A ransom note with instructions for paying the ransom shows as a .txt file.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by Crysis Ransomware


Malware Removal Tool

User ExperienceJoin our forum to Discuss Crysis Ransomware.
Data Recovery ToolStellar Phoenix Data Recovery Technician’s License Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.


Crysis Ransomware – Delivery

Crysis ransomware can be delivered in several ways. One is through spam emails containing a malicious file attached to it. If the attachment is opened, it automatically injects malware inside your computer. Malicious code could also hide in the body of the email. That means that you can get infected just by opening such an email, no matter if you tamper with the attachment.

Other ways this ransomware gets delivered are with the help of social networks and file sharing services, which could contain malicious attachments or files with the Crysis ransomware’s payload inside. The files could be presented to you as useful or things you need, such as an important update. Browsing unknown websites and clicking on redirect links can also lead to an infection from this malware.

Crysis Ransomware – Technical Information

The Crysis ransomware is classified by researchers as a ransomware. When a computer is infected with the ransomware, it creates an executable file, and it could make new Windows Registry values as a persistence measure.

The executable file could have different names and be randomly generated, but it has been detected in the following directory with the name written below multiple times:


The modifications in the Windows Registry are generally created in these registry entries:




That also includes the ransomware setting itself to start automatically with each boot of the Windows operating system.

Next, the ransomware will create a file with a randomly generated name, which contains the ransom message. The instructions in it, describing how the ransom can be paid are always these:

Attention! Your computer was attacked by virus-encoder.
All your files are encrypted cryptographically strong, without the original key recover is impossible! To get the decoder and the original key, you need to to write us at the with subject “encryption” stating your id.
Write in the case, do not waste your and our time on empty threats.
Responses to letters only appropriate people are not adequate ignore.

P.S. only in case you do not receive a response from the first email address within 48 hours please use this alternative email

The file is a picture which is set as your desktop background after the encryption process is complete.

Two different emails are provided for contacting the developers of the Crysis ransomware. One registered as a domain in the Czech Republic and the other in India, but the origin of the ransomware is unknown. The cyber-criminals state in their ransom note that you should write to them if you want your files decrypted.

Contacting the ransomware creators for intending to pay for the ransom is NOT advised. No guarantee exists that your files are going to be unlocked and restored. Also, paying ransomware makers is almost the same as supporting their actions and encouraging them to make an even tougher variant of the malware.

The Crysis ransomware searches to encrypt various types of files. Files that could be encrypted have the following extensions:

→.odc, .odm, .odp, .ods, .odt, .docm, .docx, .doc, .odb, .mp4, sql, .7z, .m4a, .rar, .wma, .gdb, .tax, .pkpass, .bc6, .bc7, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps

After the encryption is fully finished, encrypted files have the .CrySiS extension. The encryption method used is suspected to be an RSA algorithm mixed with AES ciphers, like many other ransomware, because it is considered unbreakable.

The Crysis ransomware is known to encrypt the following file locations:

  • %UserProfile%\Local Settings\Application Data
  • %localappdata%
  • %WINDIR%\System32
  • %TEMP%
  • %userprofile%\downloads

For the moment, it is unknown if Shadow Volume Copies are deleted from the Windows OS, but probably is the case. After removing the ransomware, you should see the fourth part of the instructions provided bel

There are many variants of the CrySiS ransomware and most of them act in the same principle:

Remove Crysis Ransomware and Restore .Crysis Encrypted Files

If you were infected by the Crysis ransomware, you should have a bit of experience in removing malware. The ransomware can lock your files irreparably, and therefore, it is greatly recommended that you be quick and follow the step-by-step instructions written below.


Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts


  1. AvatarDominick Turnbull

    I can confirm that it does delete the VSS files.

    1. SensorsTechForumSensorsTechForum

      Hello Dominick,

      It doesn’t surprise us that Crysis ransomware deletes Shadow Volume Copies, as most recent crypto viruses do so. Thanks for confirming.

      However, can you provide us with more information? Have you been infected by Crysis? If that’s the case, what have you done so far?

      Keep in touch!

  2. AvatarPsyBoot Boot

    Yeap delete the VSS files… I have been infected in my VM, i have bkp of the VM soooo no problens, but dont know how they infected me, i have some pictures if u guys want =)


Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share