Severity scale:  

Fake WindowsUpdater ransomware virus. How to remove? (Uninstall guide)

removal by Alice Woods - - | Type: Ransomware

What should you know about Fake WindowsUpdater virus?

FakeWU ransomware or, more specifically, Fake WindowsUpdater virus is a crypto-ransomware [1] which seems to be created by an Indonesian-based malware developer known by a screen name FathurFreakz. This extravagant individual openly boasting about his cyber attacks on social media, and FakeWU appears to be his latest creation. Though the distribution of this virus is currently rather low, the malware sure has the potential of expanding to broader waters. One of the factors that may determine its success it the choice of advanced encryption standard AES-256 [2] when rendering victim’s files unreadable. Most of the successful ransomware projects were based on this particular encryption and allowed the extortionists to accumulate a considerable profit. Of course, we can only hope that this scenario will not reoccur in the case of Fake WindowsUpdater ransomware and the virus will be decrypted or die down some time in the near future. In the meanwhile, the best advice we can give to the infected users is to banish the virus from their computers as soon as possible and refuse paying the demanded ransom money for the encrypted files. Of course, this is not the best option when it comes to getting back your files, but it is even worse for the hacker. Do not hesitate and remove Fake WindowsUpdater with trusted antivirus software, say Reimage to be able to proceed with data recovery.

Questions about Fake WindowsUpdater ransomware virus

FakeWU virus is a deceptive malware; it sneaks into the computers inside an obfuscated email attachment labeled as Transaction-Report.docx which features a hidden .exe extension at the end. This means that this document is not actually a .docx file but rather an executable which establishes the connection with hxxps:// and hxxps:// servers to download and activate the virus on the target computer. After it is done, the newly downloaded WindowsUpdater.exe takes over and starts scanning the computer for over 660 types of files and encrypts them additionally appending .encrypted extensions. Finally, the malware is programmed to open a pop-up window called “FILE SECURITY PROTECTED” which features the ransom note and instructions for data recovery. Below, you can see the transcribed content of this message:

Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer.
Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key.
Now you have the last chance to decrypt your files.
1. Buy Bitcoin (
2. Send amount of 0.02 BTC to address: 3BsyRz2scfvXcWRaycPoizEH5hAbDmWcpNE
3. Transaction will take about 15-30 minutes to confirm.
4. When transaction is confirmed, send email to us at
5. Write subject of your mail with :
‘Restore my files ***’
6. Write content of your mail with :
Computer Identifier : *** ‘
7. We will contact you back with your private key.
button [RESTORE]

While 0.02 BTC [3] may not seem like that large of a sum to pay for the recovery of your files, you should remember that the money that lands in the hands of a hacker may later be used to generate even more malicious content that would continue to terrorize the online community. So, Fake WindowsUpdater removal is the best discouragement that is upon your power. If you need some help regarding the virus elimination, check out the recommendations at the end of this article or consult our experts directly in the Ask Us section of this site.

Means of ransomware infiltration

Either your device gets infected with Fake WindowsUpdater or some other malware, it signals serious security problems. Ransomware typically attack computers that contain outdated or illegal software [4], which are not protected with any security utilities, and which users are careless or clueless when it comes to browsing the web. Sure, paying attention to the mentioned aspects and fixing them to satisfy all security standards may diminish the risk of getting infected with the Fake WindowsUpdater, but it will not abolish it completely. Your best bet in protecting your data is keeping data backups [5]. These extra copies of your files will allow a quick data recovery in case of ransomware attack or some other emergency.

What are my options regarding Fake WindowsUpdater removal?

If you want to remove Fake WindowsUpdater virus with the least damage to your computer you have to act quick and employ sophisticated tools. But keep in mind that ransomware are complicated viruses which means they might prevent security programs from eliminating them by obfuscating files and simply blocking system scans. In such a case, you will have to take additional measures and decontaminate the program manually. Nevertheless, Fake WindowsUpdater removal does not end there, and you must run the automatic scan of your again to banish it for good.

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software to remove Fake WindowsUpdater ransomware virus you agree to our privacy policy and agreement of use.
do it now!
Reimage (remover) Happiness
Reimage (remover) Happiness
Compatible with Microsoft Windows Compatible with OS X
What to do if failed?
If you failed to remove infection using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to uninstall Fake WindowsUpdater ransomware virus. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
More information about this program can be found in Reimage review.
Press mentions on Reimage

Manual Fake WindowsUpdater virus Removal Guide:

Remove Fake WindowsUpdater using Safe Mode with Networking

Fake WindowsUpdater elimination is difficult process and even professsional automatic software may struggle banishing it from your system. Thus, you may have to help it manually. The instructions how to do it are presented below:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Fake WindowsUpdater

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Fake WindowsUpdater removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Fake WindowsUpdater using System Restore

In case the first Fake WindowsUpdater decontamination method does not work, you may try out these steps:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Fake WindowsUpdater. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that Fake WindowsUpdater removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Fake WindowsUpdater from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by Fake WindowsUpdater, you can use several methods to restore them:

How can Data Recovery Pro help recover files encrypted by Fake WindowsUpdater?

If you want to try out some quick and fully automatic method of data recovery, you shoud try Data Recovery Pro. Here is how it works:

Fake WindowsUpdater affected files can be restored using Windows Previous Versions feature

We have some good news for the users who had System Restore function enabled before Fake WindowsUpdater attack. YOu may be able to restore them using Windows Previous Versions feature. The tutorial below explain how it should be done:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

How does ShadowExplorer deal with files encrypted by Fake WindowsUpdater?

ShadowExplorer is a helpful tool which can be applied for the data recover as long as the Volume Shadow Copies of the corrupted files are on the computer. If the virus has destroyed them, you may have to stick to the previous two recovery methods.

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Fake WindowsUpdater and other ransomwares, use a reputable anti-spyware, such as Reimage, Plumbytes Anti-MalwareWebroot SecureAnywhere AntiVirus or Malwarebytes Anti Malware

About the author

Alice Woods
Alice Woods - Likes to teach users about virus prevention

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Alice Woods
About the company Esolutions