Severity scale:  

Creeper ransomware. How to remove? (Uninstall guide)

removal by Ugnius Kiguolis - - | Type: Ransomware

Creeper – ransomware virus that demands a ransom in Monero

A printscreen of Creeper ransom note

Creeper ransomware is a file-encrypting cyber infection, which seeks to lock personal files on victim's PC using a sophisticated AES encryption algorithm[1] and then demand a ransom for a personal decryption key. The distinguishing mark of the virus is a .creeper file extension appended to each encrypted .doc, .pdf, .jpg, .png, .avi, .txt, etc. file.

Upon successful infiltration and data encryption, Creeper ransomware a text file named DECRIPT_MY_FILES.txt, which stands for a ransom note. It instructs the victim to contact the extortionists via email address and send them a unique code that is indicated on a ransom note.

Decrypting your files is easy. Take a deep breath and follow the steps below.
1 ) Make the proper payment.
Payments are made in Monero. This is a crypto-currency, like bitcoin.
You can buy Monero, and send it, from the same places you can any other
crypto-currency. If you're still unsure, google 'monero exchange.'
Sign up at one of these exchange sites and send the payment to the address below.
Payment Address (Monero Wallet):
2 ) Farther you should send the following code: *** to email address
Then you will receive all necessary key.
Prices :
Days : Monero : Offer Expires
0-2 : 3 : 03/01/18
3-5 : 5 : 03/04/18
Note: In 6 days your password decryption key gets permanently deleted.
You then have no way to ever retrieve your files. So pay now.

In the text file, the ransomware does not indicate the particular amount of the ransom. The size of the redemption depends on how fast the victim reacts to the current situation. If the victim contacts the developers of the Creeper virus in two days or less, he or she will be asked to pay 3 Monero[2] coins, which is currently more than 800 USD. The price for those who respond within 3-5 days increases to 5 Monero coins, while the absolute deadline is six days. According to crooks, in 6 days the Creeper decryptor is permanently deleted.

All information related to this virus is originally written in English, so experts speculate that it's oriented to English-speaking users. Since English is a universal language, the prevalence of this crypto-extortionists is expected to be large.

Despite the fact that this file-encrypting virus is not yet decryptable, we strongly encourage you to remove Creeper using Reimage, Plumbytes Anti-MalwareWebroot SecureAnywhere AntiVirus, Malwarebytes Anti Malware or another reputable anti-virus. You should not pay the ransom due to two important reasons – money loss and future attacks. You can never know whether the felons creating ransomware virus are conscientious. They may not store a decryptor at all, so after transferring Monero, they may not send you a decryptor or send the one that is not working. Besides, paying the ransom is not a decent move as you will motive crooks to keep initiating their shady activities.

If you are not aware how to initiate Creeper removal or the ransomware keeps blocking your anti-virus continuously, you can follow the instructions provided at the end of this article. You will also find several alternative methods that can help you to decrypt files encrypted by Creeper virus.

Ransomware developers rely on the success of malspam campaigns

According to the latest reports, the usage of drive-by download attacks and exploit kits for ransomware distribution are falling since 2017.[3] Although some major attacks via RIG EK and other exploit kits have been revealed through the last year, the numbers are decreasing leaving malspam campaigns as the primary distributor of the file-encrypting virus.

However, the revelation of such tendency does not mean that PC users can stop being careful with suspicious ads or start surfing on illegal and potentially dangerous websites. Precautionary measures have to be in mind all the time because hackers the old virus distribution methods are often refined coming back with the new strength.

One malware distribution strategy seems to be stable – that's spam emails. Hackers use various bots (Necurs most frequently) to disseminate tricky email messages with malicious email attachments. Such messages can mimic various authorities and indicate an attachment as invoice, report, or another official document. Usually, such attachments require to enable Macros and, if the potential victim, does that, he or she unintentionally activates the ransomware.

To protect yourself from similar cyber attacks, experts from[4] recommend you to keep a reputable anti-virus activated and update it regularly. Besides, avoid interaction with any content that looks suspicious to you. Although people often have a presentiment about email attachments or fake ads on the internet, curiosity often overcomes the fair of getting their PCs infected.

Learn how to remove Creeper virus quickly

Creeper removal can hardly be initiated without the assistance of anti-virus tool. Unlike less dangerous viruses, ransomware is known for initiating multiple system's changes, including corruption of Registry Entries.
The problem is that you may not be able to remove Creeper virus with the help of anti-virus. It may prevent the anti-malware tool from being launched and block the installation of a new one. In this kind of situation, you should initiate the steps that are given below.

Once you eliminate Creeper ransomware from the system, you should try to recover your files from Shadow Volume Copies, previous Windows version or use additional data recovery tools. Those who have file backups should skip data recovery steps and go ahead to the recovery from backups.

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software to remove Creeper ransomware you agree to our privacy policy and agreement of use.
do it now!
Reimage (remover) Happiness
Reimage (remover) Happiness
Compatible with Microsoft Windows Compatible with OS X
What to do if failed?
If you failed to remove infection using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to uninstall Creeper ransomware. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
More information about this program can be found in Reimage review.
Press mentions on Reimage

Manual Creeper virus Removal Guide:

Remove Creeper using Safe Mode with Networking

Creeper removal can become a mission impossible if the virus blocks your anti-virus. If you are stuck on your PC with all the files encrypted, you should follow the steps below to reboot your PC into Safe Mode with Networking. This way, you should be able to run a scan with your anti-virus:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Creeper

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Creeper removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Creeper using System Restore

These steps apply for those who cannot launch anti-virus even when in Safe Mode with Networking or if they cannot access this mode:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Creeper. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that Creeper removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Creeper from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

The methods that are given below can help you to recover files encrypted by Creeper ransomware.

If your files are encrypted by Creeper, you can use several methods to restore them:

Use Data Recovery Pro utility

Data Recovery Pro is a tool helping people to retrieve files after system's crash or accidental deletion. Nevertheless, it recovered millions of files encrypted by ransomware viruses, so it's worth giving a try:

Windows Previous Versions feature can recover the most important files

If you have enabled a Restore Point before Creeper virus attacked your PC, then you should try to recover the most important files with the following guide:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Try ShadowExplorer

Once you remove Creeper ransomware, install ShadowExplorer and try to recover your files from Windows Shadow Volume Copies. 

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Creeper decryptor is not yet available

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Creeper and other ransomwares, use a reputable anti-spyware, such as Reimage, Plumbytes Anti-MalwareWebroot SecureAnywhere AntiVirus or Malwarebytes Anti Malware

About the author

Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions