Skip to main content
Published Jun 13, 2016 | Updated Sep 15, 2017

Ransom:Win32/Sorikrypt.A

Detected with Windows Defender Antivirus

Aliases: No associated aliases

Summary

Windows Defender Antivirus detects and removes this threat. 

This ransomware can stop you from using your PC or accessing your data. It encrypts your files and might ask you to pay money (in the form of Bitcoins) to a malicious hacker.

It is generated by attackers using a free ransomware construction called Xorcist. The kit allows attackers to build fully customized ransomware in terms of target files, file name extension for encrypted files, ransom note message and file name, and unlock password.

Our ransomware FAQ page has more information on this type of threat.

Read our latest report: Ransomware 1H 2017 review: Global outbreaks reinforce the value of security hygiene.

There is no one-size-fits-all response if you have been victimized by ransomware. There is no guarantee that paying the ransom will give you access to your files. If you've already paid, see our ransomware page for help on what to do now.

Run antivirus or antimalware software

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find hidden malware.

Advanced troubleshooting

To restore your PC, you might need to download and run Windows Defender Offline. See our advanced troubleshooting page for more help.

Get more help

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

If you’re using Windows XP, see our Windows XP end of support page.

Use cloud protection

Use cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender Antivirus for Windows 10. 

Go to Settings > Update & security > Windows Defender > Windows Defender Security Center > Virus & threat protection and make sure that your Cloud-based Protection settings is turned On.

Follow us