{"id":369,"date":"2016-11-24T13:33:46","date_gmt":"2016-11-24T13:33:46","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/new-decryption-tool-for-crysis-ransomware\/"},"modified":"2019-05-29T12:21:38","modified_gmt":"2019-05-29T12:21:38","slug":"new-decryption-tool-for-crysis-ransomware","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/","title":{"rendered":"New decryption tool for Crysis ransomware"},"content":{"rendered":"<p class=\"wls-paragraph\">Since it first appeared, ransomware\u2019s profitable business \u2013 in short, compromising and encrypting data belonging to companies and users and requesting payment in exchange for the restoration of infected files \u2013has grown rapidly.<\/p>\n<p class=\"wls-paragraph\">One of the threats that has&nbsp;had a significant impact and infected a considerable number of users worldwide was the family detected by ESET solutions as&nbsp;<a href=\"http:\/\/www.virusradar.com\/en\/Win32_Filecoder.Crysis.B\/description\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Win32\/Filecoder.Crysis<\/em><\/a>. However, and luckily, ESET has developed a&nbsp;<a href=\"https:\/\/download.eset.com\/com\/eset\/tools\/decryptors\/crysis\/latest\/esetcrysisdecryptor.exe\" target=\"_blank\" rel=\"noopener noreferrer\">free tool to decrypt files<\/a>&nbsp;and recover the information that might have been compromised.<\/p>\n<p class=\"wls-paragraph\">What is Crysis?<\/p>\n<p class=\"wls-paragraph\">Crysis is a Filecoder-type malicious code whose purpose, as its name suggests, is to encrypt information and request the payment of a ransom in exchange for the return of said information. Crysis uses RSA and AES encryption with long encryption keys, which makes the recovery of processed files almost impossible.<\/p>\n<p class=\"wls-paragraph\">This family of malware gained popularity after&nbsp;<a href=\"http:\/\/www.welivesecurity.com\/2016\/06\/07\/beyond-teslacrypt-crysis-family-lays-claim-parts-territory\/\" target=\"_blank\" rel=\"noopener noreferrer\">TeslaCrypt<\/a>, another ransomware that also spread widely while it was active (it ceased its operations early this year upon the&nbsp;<a href=\"http:\/\/www.welivesecurity.com\/2016\/05\/18\/eset-releases-decryptor-recent-variants-teslacrypt-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">launch of a tool<\/a>&nbsp;to revert it).<\/p>\n<p class=\"wls-paragraph\">Top 10 most affected countries by Crysis<\/p>\n<p class=\"wls-paragraph\">Crysis spreads via multiple vectors, ranging from emails to ads in social networks.<\/p>\n<p class=\"wls-paragraph\">The growth in the number of worldwide detections started at the end of May. To date, ESET solutions have detected variants of this malware family in 123 countries, although almost 60% is concentrated in only 10 countries:<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86033\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/11\/Top-10-countries_Crysis.png\" alt=\"Top 10 countries_Crysis\" width=\"742\" height=\"481\"><\/p>\n<p class=\"wls-paragraph\">Some characteristics of Crysis<\/p>\n<p class=\"wls-paragraph\">This ransomware is simply an executable file that is not protected by a&nbsp;<em>packer,&nbsp;<\/em>which can be easily verified in the file header:<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86025\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/11\/2_cabecera_Crysis-1.png\" alt=\"2_cabecera_Crysis\" width=\"388\" height=\"416\"><\/p>\n<p class=\"wls-paragraph\">Doing a static analysis, we can identify some of the main characteristics. One of the first actions attempted by the ransomware is to create copies of itself in the following directories in order to persist in the system:<\/p>\n<ul>\n<li><em>C:UsersVictimAppDataRoamingMicrosoftWindowsStart MenuProgramsStartup<\/em><\/li>\n<li><em>C:WindowsSystem32<\/em><\/li>\n<\/ul>\n<p class=\"wls-paragraph\">The first directory is used by the operating system to execute all the applications within this directory once the user has logged on. It is clear that in this way the threat makes sure it encrypts recently created files.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86026\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/11\/3_persistencia_crysis-1.png\" alt=\"3_persistencia_crysis\" width=\"1154\" height=\"267\"><\/p>\n<p class=\"wls-paragraph\">In the second folder, the ransomware prevents the user from noticing its presence by hiding itself in a native folder, essential for Windows.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86027\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/11\/4_carpeta_donde_se_oculta_crysis-1.png\" alt=\"4_carpeta_donde_se_oculta_crysis\" width=\"588\" height=\"290\"><\/p>\n<p class=\"wls-paragraph\">One thing particular about Crysis is that it deletes the backup copies created by \u201c<em>Volume Shadow Copy Service<\/em>\u201d, a Windows XP built-in application.<\/p>\n<p class=\"wls-paragraph\">In short, the VSS service creates shadow copies of files every time a variation in the system occurs as a consequence of the installation or update of a software. As observed in the screenshot, the threat will execute a series of specific commands to delete the backup, in case there is any.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86028\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/11\/5_borrado_vss_crysis-1.png\" alt=\"5_borrado_vss_crysis\" width=\"1116\" height=\"511\"><\/p>\n<p class=\"wls-paragraph\">Below, we can see the malicious code execution flow, whose first instructions include calls to the functions mentioned before. We can also see that certain offsets contain the strings that will be used to rename the encrypted files and, in addition, a list of file extensions which will show the files searched by the threat to be encrypted.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86029\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/11\/6_strings_crysis-1.png\" alt=\"6_strings_crysis\" width=\"1208\" height=\"716\"><\/p>\n<p class=\"wls-paragraph\">Then, files containing the steps to follow to recover files shall be created, which will vary depending on the ransomware; however, Crysis will use text files or images to guide the user.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86030\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/11\/7_mensajes_rescate_crysis-1.png\" alt=\"7_mensajes_rescate_crysis\" width=\"685\" height=\"414\"><\/p>\n<p class=\"wls-paragraph\">One of the last actions taken by the threat after encrypting the user information is to send information such as the device name and an identifying code, using the HTTP protocol. It is worth mentioning that the sites to where the threat connects are compromised sites, generally servers with some vulnerable version of WordPress.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86031\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/11\/8_conexiones_http_crysis-1.png\" alt=\"8_conexiones_http_crysis\" width=\"595\" height=\"663\"><\/p>\n<p class=\"wls-paragraph\">A new tool to recover encrypted files<\/p>\n<p class=\"wls-paragraph\">ESET has created a&nbsp;<a href=\"https:\/\/download.eset.com\/com\/eset\/tools\/decryptors\/crysis\/latest\/esetcrysisdecryptor.exe\" target=\"_blank\" rel=\"noopener noreferrer\">free decryption tool for Crysis ransomware victims<\/a>&nbsp;in order to help anyone whose data or devices have been affected by the Crysis family. The tool was developed using the&nbsp;<a href=\"http:\/\/pastebin.com\/x1NydTHZ\" target=\"_blank\" rel=\"noopener noreferrer\">master decryption keys<\/a>&nbsp;recently published.<\/p>\n<p class=\"wls-paragraph\">If you have been a victim of Crysis ransomware, you can find and download the ESET Crysis decryptor from our&nbsp;<a href=\"https:\/\/www.eset.com\/int\/download-utilities\/\" target=\"_blank\" rel=\"noopener noreferrer\">free utilities page<\/a>. If you need additional information on how to use the tool, please refer to&nbsp;<a href=\"http:\/\/support.eset.com\/kb6274\/\" target=\"_blank\" rel=\"noopener noreferrer\">ESET Knowledgebase<\/a>.<\/p>\n<p>Source: <a href=\"http:\/\/www.welivesecurity.com\">WeLiveSecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since it first appeared, ransomware\u2019s profitable business \u2013 in short, compromising and encrypting data belonging to companies and users and requesting payment in exchange for the restoration of infected files \u2013has grown rapidly. One of the threats that has&nbsp;had a significant impact and infected a considerable number of users worldwide was the family detected by<\/p>\n","protected":false},"author":5,"featured_media":1759,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[160,167,169],"tags":[],"class_list":["post-369","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-privacy","category-scams"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New decryption tool for Crysis ransomware - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New decryption tool for Crysis ransomware\" \/>\n<meta property=\"og:description\" content=\"Since it first appeared, ransomware\u2019s profitable business \u2013 in short, compromising and encrypting data belonging to companies and users and requesting payment in exchange for the restoration of infected files \u2013has grown rapidly. One of the threats that has&nbsp;had a significant impact and infected a considerable number of users worldwide was the family detected by\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-24T13:33:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:21:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/enzozo-623x410-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"New decryption tool for Crysis ransomware\",\"datePublished\":\"2016-11-24T13:33:46+00:00\",\"dateModified\":\"2019-05-29T12:21:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/\"},\"wordCount\":681,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/enzozo-623x410-1.jpg\",\"articleSection\":[\"malware\",\"privacy\",\"scams\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2016\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/\",\"name\":\"New decryption tool for Crysis ransomware - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/enzozo-623x410-1.jpg\",\"datePublished\":\"2016-11-24T13:33:46+00:00\",\"dateModified\":\"2019-05-29T12:21:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/enzozo-623x410-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/enzozo-623x410-1.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New decryption tool for Crysis ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2016\\\/11\\\/24\\\/new-decryption-tool-for-crysis-ransomware\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New decryption tool for Crysis ransomware - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"New decryption tool for Crysis ransomware","og_description":"Since it first appeared, ransomware\u2019s profitable business \u2013 in short, compromising and encrypting data belonging to companies and users and requesting payment in exchange for the restoration of infected files \u2013has grown rapidly. One of the threats that has&nbsp;had a significant impact and infected a considerable number of users worldwide was the family detected by","og_url":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2016-11-24T13:33:46+00:00","article_modified_time":"2019-05-29T12:21:38+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/enzozo-623x410-1.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"New decryption tool for Crysis ransomware","datePublished":"2016-11-24T13:33:46+00:00","dateModified":"2019-05-29T12:21:38+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/"},"wordCount":681,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/enzozo-623x410-1.jpg","articleSection":["malware","privacy","scams"],"inLanguage":"en-US","copyrightYear":"2016","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/","url":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/","name":"New decryption tool for Crysis ransomware - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/enzozo-623x410-1.jpg","datePublished":"2016-11-24T13:33:46+00:00","dateModified":"2019-05-29T12:21:38+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/enzozo-623x410-1.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/enzozo-623x410-1.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"New decryption tool for Crysis ransomware"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2016\/11\/24\/new-decryption-tool-for-crysis-ransomware\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/369\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1759"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}