Severity scale:  

Cryptowall. 4 versions listed. Removal guide included. 2019

removal by Gabriel E. Hall - -   Also known as Cryptowall | Type: Ransomware

CryptoWall is a ransomware family that encrypts important files on the affected computers

Ransom notes by CryptoWall

CryptoWall is a ransomware family that is designed to use a sophisticated encryption algorithm to make files inaccessible on the targeted computers. Malware researchers spotted the first version of ransomware in 2013.[1] Since then, crypto-virus was updated several times. While some versions can be decrypted for free; others are still unbreakable in 2018.

The peak time for CryptoWall ransomware was 2014. During its lifetime, ransomware mostly affected US and Canada users. However, the United Kingdom, the Netherlands[2] and Germany were hit by the attack as well. Though, several attacks were noticed in other countries as well. In 2018, malware is not spreading actively. However, users are suggested to remain vigilant to avoid cyber attack.

Researchers assume that CryptoWall Locker virus is developed by the same group of crooks who might be accused of CryptoDefense, Cryptolocker, BitCrypt, Critroni, and Cryptorbit, ownership. It operates as Trojan horse that might arrive on the system using exploit kits and malicious spam emails. It is capable of infecting all Windows versions, including Windows XP, Windows Vista, Windows 7, and Windows 10.

On the infected system, it creates new registry entries to run with Windows startup. Additionally, it connects to remote locations and starts communicating with the Command and Control server. Right after it infects the system, it, it encrypts predetermined files and blocks the user so that he/she wouldn’t be capable of accessing them.

Questions about CryptoWall virus

CryptoWall ransomware uses RSA 2048 cryptography to target the most popular file types, such as:

.xls, .wpd, .wb2, .txt, .tex, .swf, .sql, .rtf, .RAW, .ppt, .png, .pem, .pdf, .pdb, .PAS, .obj, .msg,.mpg, .mp3, .lua, .key, .jpg, .hpp, .gif, .eps, .DTD, .doc, .der, .crt, .cpp, .cer, .bmp, .bay, .avi, .ava, .ass, .as.p, .js, .py, .pl, .db, .c, .h, .ps, .cs, .m, .rm.

It managed to so by employing elaborate file encrypting techniques which help it lock multiple files with different extensions at the same time. After the encryption process is complete, the threat presents the ransom message with data recovery instructions in DECRYPT_INSTRUCTION.txt, DECRYPT_INSTRUCTION.html, and DECRYPT_INSTRUCTION.url files.

Also, CryptoWall shows such alert:

Decrypt service
Your files are encrypted.
To get the key to decrypt files you have to pay 500 USD/EUR. If payments is not made before [date] the cost of decrypting files will increase 2 times and will be 1000 USD/EUR Prior to increasing the amount left: [count down timer]
We are present a special software – CryptoWall Decrypter – which is allow to decrypt and return control to all your encrypted files. How to buy CryptoWall decrypter?
1.You should register Bitcoin waller
2. Purchasing Bitcoins – Although it’s not yet easy to buy bit coins, it’s getting simpler every day.
3. Send 1.22 BTC to Bitcoin address: 1BhLzCZGY6dwQYgX4B6NR5sjDebBPNapvv
4. Enter the Transaction ID and select amount.
5. Please check the payment information and click “PAY”.

It is unwise paying the money as there are few guarantees that you will retrieve the files. It’s just a malicious method used for earning illegal money. After the attack, you should run a full system scan with Reimage Reimage Cleaner Intego or Malwarebytes ASAP to complete CryptoWall removal. Please, make sure you use the updated version, which will help you to remove all malicious files that belong to this ransomware.

Image of the CryptoWall virus CryptoWall ransomware is one of the most well known names in the ransomware arena. This virus not only locks files but also has an advanced payment system. You can see screenshots of the ransom note and payment site above.

Victims have to enter CAPTCHa correctly in order to access ransom payment website

Following data encryption, ransomware drops files that contains a link to the payment website which greets victims with saying:

Service to decrypt the files.
To continue please enter the code from the picture in the input field.

When victims enter the CAPTCHa correctly, they are allowed to enter the payment website. Here developers of the Ransom.Cryptowall provide detailed information how and where to buy Bitcoin in order to send them to the provided Bitcoin wallet address.

However, victims are warned that if they do not pay 500 USD/EUR until the given time, the size of the ransom will double up to 1000 USD/EUR. Additionally, victims who are considering paying the ransom can test the CryptoWall decryptor. They can decrypt one file for free.

The security experts warn that this might be the only file that you might manage to retrieve after the ransomware attack. This malicious program is created for swindling the money, and data recovery is just the matter of hackers’ conscience. Besides, some variants of malware are already decryptable. Thus, you just have to remove CryptoWall from the computer to use the free and safe software.

Updates and versions of CryptoWall ransomware

Cryptowall 2.0

Cryptowall 2.0. This ransomware is almost identical to originalCryptowall: it encrypts files, warns the victim about their encryption and then asks to pay a ransom. It uses the RSA-2048 encryption algorithm to encrypt the files and seeks to make it victim pay either $500 USD, 500 EUR or 1.22 Bitcoin. To collect this money, virus generates a unique Bitcoin payment addresses for each of affected PC users.

What is important is that this Cryptowall variant uses its own TOR gateways, for example,,, and This virus also differs from the first Cryptowall version because when it encrypts files, it deletes the original versions of user's records.

Cryptowall 3.0

Cryptowall 3.0. Just like Cryptowall and Cryptowall 2.0, this threat is used for collecting ransoms. This version spreads with the help of exploit kits, what means that it can get into the system easier than its previous examples. Once it infiltrates the computer, it encrypts needed files with the help of the same RSA-2048 algorithm and starts asking the money.

The ransom note of this virus claims that the victim has to pay a ransom of 1.22 Bitcoins or $500 within seven days. What is more, the third version of Cryptowall adds a .aaa extension to the filenames of encrypted data.

Cryptowall 4.0

Cryptowall 4.0. Also known as HELP_YOUR_FILES ransomware, this virus is filled with several features that haven't been seen previously. One of them is the ability to encrypt those files that have already been encrypted by the user. Also, it can disable you from using a System Restore and, just like each of previous variants, can also delete all Shadow Volume Copies [1]. However, now this updated version asks to pay $700 in exchange for the decryption key.

Cryptowall 5.1

Cryptowall 5.1 uses the same encryption technology as previous versions. Specifically, files encrypted with AES-256 pose a bigger challenge for IT experts. Furthermore, the ransom note is presented in the Italian language so users residing in this region are suspected to be the primary target. It also sets 48-hour limit to transfer the files.

The authors of this malware present the mail address – – for public communication. Another peculiarity of this threat is .locked appended file extension. Even if this cyber menace has assaulted your device as well, do not nurture big expectations that hackers will transfer the files even if you remit the payment.


CryptoWall imposter detected: Smrss32 ransomware virus

Envying the success of CryptoWall ransomware, many hackers attempt to generate as powerful file-encrypting malware as this one. Newly detected Smrss32 ransomware tries to deceive users into thinking that it is another version of this menacing cyber threat. However, such deception was quickly brought into the daylight by Michael Gillespie, a ransomware researcher.

Though it managed to encode more than 6 000 file types and wheedle out money from several victims, it has significant flaws [3]. Therefore, IT experts are working on the decryption tool. Since the threat pretends to be a version of CryptoWall, it attaches .encrypted to the affected files. The ransomware is known to be using AES encryption method. If you have been attacked by this virus as well, make sure to remove it first before attempting file recovery.


Victims of ransomware are not willing to pay the ransom

The original version has 2.0, 3.0, 4.0, and 5.1 variants. CryptoWall 2.0 was updated at the end of 2014. It is capable of generating unique payment addresses for each of the victims. What is more, it has authentic gateways to TOR and uses the secure deletion method that doesn't allow to use recovery tools while trying to decrypt important files.

Cryptowall 3.0[4] was released in January 2015. It seems that it is capable of encrypting new file names (HTML, PNG, TXT, URL), Soon afterward, Cryptowall 4.0[5] was released in spring and 5.1 in winter of 2016. However, this illegal business does not seem to be very profitable.

During its rampage on the Internet, it has earned more than $325 billion dollars worldwide.[5]. However, specialists estimate that one of the latest versions CryptoWall 4.0 managed to collect only $18 billion dollars in comparison with other versions of the cyber infection.

Moreover, the number of sent malicious emails with the ransomware dropped significantly as well – 7.2 million in contrast to 36,114. At first glance, such decrease might only suggest the withdrawal of the virus from the ransomware market. However, it was only a diversion.

On July 27, 2016, the medical center in New Jersey[6] reported that their database was hacked and more than 20 000 records of patients names, addresses, and credit card numbers and other confidential information was encrypted. 

Spam emails, infected ads, exploit kits and other strategies are used in ransomware distribution

Cyber criminals used four main methods to spread CryptoWall and infect devices:

  • malicious spam emails;
  • exploit kits;
  • malicious ads;
  • malware.

Malicious spam emails are traditional distribution method that allows attaching malware payload to the legitimate looking email. Malsam campaigns with CryptoWall typically included a zip archive that downloaded ransomware into the computer as soon as a victim opens it.

Thus, users should stay away from unknown emails that urge to open attached files. Bear in mind that ransomware might be included in Word, PDF or other legit file formats. Thus, before opening any attachment sent from unknown senders, you should check the security of a file using online scanners.

The second method used in malware distribution is exploit kits. Criminals used Rig, Nuclear,[7] and Angler[8] exploit kits that take advantage of three vulnerabilities in Java and Adobe Flash Player:

  • CVE-2012-0507,
  • CVE-2014-0515,
  • CVE-2014-0556.

Exploit kits were injected into both legitimate and malicious websites. If a user visits a corrupted website, she or he is redirected to site with an exploit kit which immediately checks the system for security vulnerabilities and installs malware if possible. Thus, it is highly recommended to install all available updates to avoid ransomware attack.

Additionally, malware has been noticed spread via malicious ads that were delivered on the popular and entertainment websites, such as MSN, the New York Times, BBC, etc. According to the security experts, it was the largest ransomware campaign back in 2016 when criminals took advantage of Angler exploit kit.[9]

Lastly, CryptoWall might infiltrate computers if they have been already infected with other malware. It was detected that two malicious programs – Downloader.Upatre and Trojan.Zbot – were used for downloading ransomware into computers.

Therefore, users are advised to install professional anti-virus software to protect their PCs from cyber threats. However, if you suspect that your device might have been infected, you should check the system’s security and wipe out all malicious components immediately.

Delete CryptoWall ransomware from the computer and recover your files

To remove CryptoWall virus from the computer without causing damage to the system, you have to use reputable malware removal software, for example, Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes. However, security software might be impossible to install or run due to the ransomware attack.

In order to bypass these problems, you should disable the virus first. For that, you have two options. You can either reboot system to Safe Mode with Networking or apply System Restore. Both of the methods are explained below.

However, do not forget to run a full system scan once you disable the virus. Once you preferred anti-malware tool deletes the cyber threat, you can think of data recovery. If you have backups, you can use them. Otherwise, you can try CryptoWall decryptor (if you were hit by a decryptable version of the virus) or try third-party tools. The recovery file is given below.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.
CryptoWall virus snapshot
Cryptowall 4.0Cryptowall 2.0Cryptowall decrypt pageCryptowall 3.0
Cryptowall 4.0

To remove CryptoWall virus, follow these steps:

Remove CryptoWall using Safe Mode with Networking

CryptoWall might block the access to your antivirus software or try to prevent you from its removal in some other ways. When in such situation, do not panic and follow the instructions below.

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove CryptoWall

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete CryptoWall removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove CryptoWall using System Restore

Our experts have prepared the guide below to help you decontaminate the Cryptowall virus and carry out its removal smoothly. Scroll below to learn about its steps:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of CryptoWall. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that CryptoWall removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove CryptoWall from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by CryptoWall, you can use several methods to restore them:

The effectiveness of Data Recovery Pro

There have been released decryption software for the original version of CryptoWall, but as new versions of the malware have emerged, the decrypter might not work. However, virus researchers are still working on it. Thus, you might try using Data Recovery software to retrieve some of your files.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by CryptoWall ransomware;
  • Restore them.

Applying Windows Previous Versions feature for the recovery of files encrypted by CryptoWall

If you are infected with a version of CryptoWall on which our provided decrypter does not work, you may try the recovery using Windows Previous Versions feature. We explain how to use this tool here:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

ShadowExplorer as a solution to file recovery:

As we have mentioned, you can use free tool to unlock files encrypted by CryptoWall. Nevertheless, some of the virus versions may be resistant to this decryption method, thus, software like Shadow Explorer may come in handy. Try this technique out following steps below.

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

CryptoWall Decrypter

Using this free decryption tool might give you a chance to recover the files.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from CryptoWall and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.

The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login. 

VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.

Backup files for the later use, in case of the malware attack

Computer users can suffer various losses due to cyber infections or their own faulty doings. Software issues created by malware or direct data loss due to encryption can lead to problems with your device or permanent damage. When you have proper up-to-date backups, you can easily recover after such an incident and get back to work.

It is crucial to create updates to your backups after any changes on the device, so you can get back to the point you were working on when malware changes anything or issues with the device causes data or performance corruption. Rely on such behavior and make file backup your daily or weekly habit.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware occurs out of nowhere. Use Data Recovery Pro for the system restoring purpose.

About the author
Gabriel E. Hall
Gabriel E. Hall - Passionate web researcher

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Gabriel E. Hall
About the company Esolutions

Removal guides in other languages

  1. Jason says:
    January 31st, 2015 at 11:18 pm

    Even if I use those, how do I get the music and other files back?

  2. JR says:
    February 17th, 2015 at 10:12 pm

    Download a program called Shadow Explorer. It will locate shadow copies of your files and allow you to restore them…if your lucky. I just had success with this resolution; good luck!

  3. GK says:
    December 26th, 2015 at 6:19 pm

    Only works if system restore is enabled and you are using Win7 or newer.

  4. Doc says:
    June 5th, 2015 at 6:18 pm

    I am using Malwarebytes and its not removing the Crypto virus. It tries, but the virus just shows right back up. Any ideas on what else I can do? I have gone through and looked at some stuff manually but am unable to determine what may be “re-installing” it.

  5. RV says:
    June 15th, 2015 at 12:42 pm

    My M/S OneDrive has been infected so all my backupped data! How can M/S not have an Anti Virus software??

  6. pof says:
    June 17th, 2015 at 9:40 am

    Solutions gentleman….not words…..

  7. Carl says:
    July 22nd, 2015 at 4:56 pm

    Instalei, o programa achou o virus e pediu para compra o programa!The program only works if you buy it.

  8. mulki says:
    December 14th, 2015 at 10:50 pm

    please help me….i had re install C drive with new Win 7 OS….but all my files on D and E drives are still encrypted!!….please anyone…help me…!!!!

  9. sw says:
    January 23rd, 2016 at 1:22 pm

    I have scaned with SpyHunter but cannot get the registration screen to show up.

  10. Dan says:
    April 5th, 2016 at 9:29 am

    Araykha, I would very much appreciate it if you could help me. I will be sending you one of my files. My only question is, how would you go about trying to decrypt them? Even if you have/got the decryption key, where do I enter it? I got the virus in 11/2014 (cryptowall rsa-2048) and all the websites listed on it have been removed. Thank you very much for your time.

  11. Michael Stevens says:
    May 5th, 2016 at 6:10 pm

    Cryptowall is horrible. The cheapest way I could find to get my files back was at I got the decrypter and fixed my computer. Then I backed up everything.

  12. Michael Stevens says:
    May 5th, 2016 at 6:11 pm

    Cryptowall is horrible. The cheapest way I could find to get my files back was at I got the decrypter and fixed my computer. Then I backed up everything.

Your opinion regarding CryptoWall virus