We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Behavior:Win32/Crilock.A
Aliases: No associated aliases
Summary
Microsoft Defender Antivirus detects this threat.
This detection is used to monitor suspicious or malware-like behavior on your PC. It is a generic detection, which means the malicious behaviors can greatly vary.
If we receive a significant number of reports about this suspicious behavior, we will add a specific detection and include a more detailed analysis.
Microsoft doesn’t recommend you pay the fine. There is no guarantee that paying the ransom will give you access to your files.
If you've already paid, see our ransomware page for help on what to do now.
Run antivirus or antimalware software
Use the following free Microsoft software to detect and remove this threat:
- Microsoft Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista
- Microsoft Safety Scanner
You should also run a full scan. A full scan might find hidden malware.
Advanced troubleshooting
You might be able to recover encrypted files by using the tool discussed in the MMPC blog post FireEye and Fox_IT tool can help recover Crilock-encrypted files.
To restore your PC, you might need to download and run Windows Defender Offline. See our advanced troubleshooting page for more help.
Get more help
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
If you’re using Windows XP, see our Windows XP end of support page.