Home Malware Programs Ransomware Crysis Ransomware

Crysis Ransomware

Posted: February 19, 2016

Threat Metric

Ranking: 6,430
Threat Level: 10/10
Infected PCs: 85,660
First Seen: February 19, 2016
Last Seen: October 16, 2023
OS(es) Affected: Windows


The Crysis Ransomware is a file encryption-based Trojan. The Crysis Ransomware exploits data encoding algorithms which typically would protect digital content for the purpose of making that data inaccessible and holding them for ransom. Since con artists will not honor any obligations regarding delivering a decryptor necessarily, malware researchers always espouse the use of backups as a safe and reliable data recovery strategy. A full removal of the Crysis Ransomware also requires edits to your system Registry and other OS components that are most easily handled by your automated anti-malware products.

The Danger of Playing a Game of the Crysis

A great many PC owners think of malware as being a mostly silent threat that only can harm your machine when you don't identify it. However, this narrow view of threatening software overlooks one of the most popular types of Trojans for 2015 and 2016: the file-encrypting Trojan. Threats like the Crysis Ransomware conduct initial attacks without significant symptoms, but, afterward, show clear signs of their presence that detach the visibility of the infection from the extent of potentially irreversible damage already incurred.

The Crysis Ransomware's initial installation includes a Registry-modifying exploit that enables the program to launch when Windows starts. The first half of its payload scans your computer for files falling within formats it deems worthy of being encrypted. While the Crysis Ransomware includes the usual documents, images and audio formats, the Crysis Ransomware also attacks some niche ones, compared to the older file encryptors malware experts have examined in the past few months. Some examples include Access databases, components of Apple software like iTunes, and replays of online gaming sessions.

All content following under the Crysis Ransomware's relatively broad net runs through an encryption algorithm, preventing your programs from opening them. They also are given a new extension, the '.the Crysis' string, appended to the end of every name.

The Crysis Ransomware's last act is to place ransom notes in different formats on your PC, as well as lock your desktop background to a BMP-based note. E-mail communications are its recommended method for procuring a decryption solution, which victims typically are expected to pay for in Bitcoin currency.

Taking the Crisis out of Your Computer Files

There is always the risk of gaining nothing from paying a ransom for your content. Given time, some PC security institutions may develop decryption solutions for the Crysis Ransomware's attacks that will not require a purchase. Before then, your clearest means of self-defense is to keep multiple backups in locations unlikely to be scanned by the Crysis Ransomware, such as password-protected servers or unattached devices.

Although a clear majority of file encryption threats travel through disguised e-mail attachments, malware researchers also have seen other infection vectors in use. The Crysis Ransomware's extension of choice could be a symptom of its sharing an installation strategy with the Mahasaraswati Ransomware: pirated installers for Crytek's the Crysis video game. Downloading illicit media is one of the shortest routes to exposing your PC to more than one kind of threat.

Properly deleting the Crysis Ransomware also requires deleting components that will conceal themselves in default Windows folders and other areas of your OS. Average PC operators can do so most comfortably and efficiently through scanning their systems with one or more anti-malware products. Since the Crysis Ransomware has no self-distribution mechanisms of note, malware experts warn to expect the possible presence of associated threats, as well, such as a Trojan downloader.

However you choose to remove it, the Crysis Ransomware clearly is only a crisis to the wallets of the ill-prepared.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%WINDIR%\System32\3A13.tmp.exe File name: 3A13.tmp.exe
Size: 641.53 KB (641536 bytes)
MD5: cced409e95d6c2e44823381df3880d96
Detection count: 326
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\System32\3A13.tmp.exe
Group: Malware file
Last Updated: September 18, 2021
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2110.exe File name: 2110.exe
Size: 778.75 KB (778752 bytes)
MD5: 2566cea080491a6e9c64102b66cb2d1a
Detection count: 239
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: July 15, 2020
%WINDIR%\System32\731.tmp.exe File name: 731.tmp.exe
Size: 916.48 KB (916480 bytes)
MD5: 7c7d821e85b6f5d237612a0ad63c5244
Detection count: 199
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\System32\731.tmp.exe
Group: Malware file
Last Updated: June 27, 2020
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\53BB.tmp.exe File name: 53BB.tmp.exe
Size: 603.13 KB (603136 bytes)
MD5: b510cded2f1ecb49eca3bf95b2ce447e
Detection count: 180
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\53BB.tmp.exe
Group: Malware file
Last Updated: September 16, 2021
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\914E.tmp.exe File name: 914E.tmp.exe
Size: 709.12 KB (709120 bytes)
MD5: dcfd90a02459ee819324c016c1d8ced3
Detection count: 178
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming
Group: Malware file
Last Updated: September 16, 2021
%WINDIR%\System32\B7C9.tmp.exe File name: B7C9.tmp.exe
Size: 901.63 KB (901632 bytes)
MD5: 9390d7fcb41867482a31c355c311ba03
Detection count: 115
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\System32\B7C9.tmp.exe
Group: Malware file
Last Updated: June 27, 2020
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\bea04ab8.exe File name: bea04ab8.exe
Size: 220.67 KB (220672 bytes)
MD5: 200006d00a2864eff09d0bd250c31511
Detection count: 110
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\bea04ab8.exe
Group: Malware file
Last Updated: June 27, 2020
%SYSTEMDRIVE%\Users\<username>\appdata\local\temp\7bd2.tmp.exe File name: 7bd2.tmp.exe
Size: 701.95 KB (701952 bytes)
MD5: bdcc1679cd27d8b9e601c58e4b2a4f4e
Detection count: 105
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\local\temp\7bd2.tmp.exe
Group: Malware file
Last Updated: September 16, 2021
%WINDIR%\System32\3CD.tmp.exe File name: 3CD.tmp.exe
Size: 615.42 KB (615424 bytes)
MD5: 299ed986a6988eb277a59c377d72f538
Detection count: 103
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\System32\3CD.tmp.exe
Group: Malware file
Last Updated: June 27, 2020
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\75E6.tmp.exe File name: 75E6.tmp.exe
Size: 1.04 MB (1043456 bytes)
MD5: 6bd4da60c0a7e5f1cfa78c6f9ed46c82
Detection count: 89
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\75E6.tmp.exe
Group: Malware file
Last Updated: September 16, 2021
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\99FE.tmp.exe File name: 99FE.tmp.exe
Size: 726.01 KB (726016 bytes)
MD5: 3b6920ae5d16db71e5faec28ec14839c
Detection count: 82
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\99FE.tmp.exe
Group: Malware file
Last Updated: September 16, 2021
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\63D9.tmp.exe File name: 63D9.tmp.exe
Size: 382.46 KB (382464 bytes)
MD5: fb18d3a278711aa1c2aa810adc020fe7
Detection count: 49
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\63D9.tmp.exe
Group: Malware file
Last Updated: September 16, 2021
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\a881.tmp.exe File name: a881.tmp.exe
Size: 710.65 KB (710656 bytes)
MD5: 289b13c43f1591d099b8fbf9a3c6fd52
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming
Group: Malware file
Last Updated: September 16, 2021
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\113_1.exe File name: 113_1.exe
Size: 358.91 KB (358912 bytes)
MD5: d514d2c83259736eb02e9c21c70cf7ce
Detection count: 28
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: December 17, 2019
c:\Users\<username>\appdata\local\temp\y5sxvjna.part File name: y5sxvjna.part
Size: 528.38 KB (528384 bytes)
MD5: 681949435d7ea0b71d91078943411a39
Detection count: 21
Mime Type: unknown/part
Path: c:\Users\<username>\appdata\local\temp
Group: Malware file
Last Updated: December 11, 2019
C:\Users\<username>\AppData\Roaming\7b50d997.exe File name: 7b50d997.exe
Size: 338.94 KB (338944 bytes)
MD5: fea385d6b88e6cf0e5a3fa4a939bba43
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Roaming
Group: Malware file
Last Updated: October 10, 2019
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\7b50d997.exe File name: 7b50d997.exe
Size: 367.55 KB (367559 bytes)
MD5: caef6f75a607bd648208a418c7e11b5a
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming
Group: Malware file
Last Updated: October 10, 2019
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\cc08.tmp.exe File name: cc08.tmp.exe
Size: 457.21 KB (457216 bytes)
MD5: 2cd0b38ee73521578c487b744606c63c
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming
Group: Malware file
Last Updated: February 21, 2020
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\d2c14b63.exe File name: d2c14b63.exe
Size: 169.58 KB (169581 bytes)
MD5: 31ce952855b8a993518b6ff0397bd1ea
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\d2c14b63.exe
Group: Malware file
Last Updated: June 27, 2020
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\20e12340.exe File name: 20e12340.exe
Size: 162.73 KB (162731 bytes)
MD5: 2a446a0c99194d0d869ac0afb53c7445
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\20e12340.exe
Group: Malware file
Last Updated: June 27, 2020
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\7b50d997.exe File name: 7b50d997.exe
Size: 215.55 KB (215557 bytes)
MD5: 97759efa7a6a80ea4edcfad8272d6a4c
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\7b50d997.exe
Group: Malware file
Last Updated: June 27, 2020

More files

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%APPDATA%\[RANDOM CHARACTERS]_201[NUMBERS]-[NUMBERS]-[NUMBERS]_[NUMBERS]-[NUMBERS].exe%APPDATA%\exe.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\[RANDOM CHARACTERS]_201[NUMBERS]-[NUMBERS]-[NUMBERS]_[NUMBERS]-[NUMBERS].exe%appdata%\microsoft\windows\start menu\programs\startup\[RANDOM CHARACTERS]payload.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Skanda[RANDOM CHARACTERS].exe%APPDATA%\microsoft\windows\start menu\programs\startup\winhost.exe%APPDATA%\osk.exe%APPDATA%\setap[RANDOM CHARACTERS].exe%APPDATA%\Skanda[RANDOM CHARACTERS].exe%userprofile%\documents\system.exe%windir%\system32\payload.exe%WINDIR%\System32\Skanda.exe%windir%\syswow64\payload.exe

Related Posts

Loading...