Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Jun 09, 2014 | Updated Sep 15, 2017

Ransom:Win32/Tescrypt.A

Detected by Microsoft Defender Antivirus

Aliases: TR/Agent.360448.280 (Avira) Trojan horse Crypt3.CGZF (AVG) W32/Trojan.OTNA-9162 (Command) Win32/Kryptik.CZOK trojan (ESET) W32/Androm.CZOK!tr.bdr (Fortinet) Backdoor.Win32.Androm.gizl (Kaspersky)

Summary

Windows Defender detects and removes this threat.

This ransomware encrypts the files on your PC and directs you to a webpage with instructions on how to unlock them. It asks you to make a payment using bitcoins.

As of April 2015, we have observed an increase in Tescrypt activity as it gets dropped by a few exploit kits such as Exploit:SWF/Axpergle (Angler), Exploit:JS/Neclu (Nuclear), JS/Fiexp (Fiesta), and JS/Anogre (Sweet Orange).

More information about ransomware can be found on our Ransomware page.

Find out ways that malware can get on your PC.  

There is no one-size-fits-all response if you have been victimized by ransomware. There is no guarantee that paying the ransom will give you access to your files.

If you've already paid, see our ransomware page for help on what to do now.

Run antivirus or antimalware software

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find hidden malware.

Advanced troubleshooting

You might be able to use the Talos TeslaCrypt Decryption Tool or the TeslaDecoder Tool to recover your encrypted files. However, Microsoft makes no representations or warranties that the tool will recover your files.

To restore your PC, you might need to download and run Windows Defender Offline. See our advanced troubleshooting page for more help.

You can also ask for help from other PC users at the Microsoft virus and malware community.

If you’re using Windows XP, see our Windows XP end of support page.

Enable MAPS 

Enable the Microsoft Active Protection Service (MAPS) on your system to protect your enterprise software security infrastructure in the cloud.

  1. Check if MAPS is enabled in your Microsoft security product:

    1. Select Settings and then select MAPS.

    2. Select Advanced membership, then click Save changes. With the MAPS option enabled, your Microsoft anti-malware security product can take full advantage of Microsoft's cloud protection service. 

  2. Join the Microsoft Active Protection Service Community.  
Follow us