Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Jan 15, 2014 | Updated Sep 15, 2017

Worm:MSIL/Crilock.A

Detected by Microsoft Defender Antivirus

Aliases: winpe/CryptoLocker.G (Norman) Trojan horse MSIL.BN (AVG) TR/Zusy.74906.1 (Avira) Gen:Variant.Zusy.74906 (BitDefender) MSIL/Filecoder.E trojan (ESET) Mal/Ransom-CD (Sophos) WORM_CRILOCK.SM (Trend Micro)

Summary

Windows Defender detects and removes this threat.

Worm:MSIL/Crilock.A can pose as a software update or an activator for paid software like TeamViewer, Photoshop, ESET antivirus, and Windows Office. It spreads to other PCs via removable drives.

It encrypts your files and asks you to pay a ransom to retrieve the. It asks you to pay using Bitcoin within 72 hours.

There is no one-size-fits-all response if you have been victimized by ransomware. There is no guarantee that paying the ransom will give you access to your files.

If you've already paid, see our ransomware page for help on what to do now.

Run antivirus or antimalware software

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find other, hidden malware.

Advanced troubleshooting

You might be able to recover encrypted files by using the tool discussed in the MMPC blog post FireEye and Fox_IT tool can help recover Crilock-encrypted files.

To restore your PC, you might need to download and run Windows Defender Offline. See our advanced troubleshooting page for more help.

Get more help

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

If you’re using Windows XP, see our Windows XP end of support page.

Follow us