

If you are interested in this infection or wish to ask questions about it, please visit this CryptoLocker support topic. Info: There is a very active CryptoLocker support topic, which contains discussion and the experiences of a variety of IT consultants, end users, and companies who have been affected by CryptoLocker. If you have anything that you think should be added, clarified, or revised please let us know in the support topic linked to above. This guide will continue to be updated as new information or approaches are gathered. Big thanks to everyone who contributed information about this infection.

I apologize in advance if this is seen as helping the developers, when in fact my goal is to help the infected users with whatever they decide to do.Īll of this information has been compiled from my own experimentation with this infection, from Fabian Wosar of Emsisoft who first analyzed this infection, and through all the consultants and visitors who contributed to our 207 page CryptoLocker support topic. Unfortunately, this infection is devious and many people have no choice but to pay the ransom in order to get their files back. In many ways this guide feels like a support topic on how to pay the ransom, which sickens me. This FAQ will give you all the information you need to understand the infection and restore your files via the decrypter or other methods. As was one of the first support sites to try helping users who are infected with this infection, I thought it would be better to post all the known information about this infection in one place. There is a lot of incorrect and dangerous information floating around about CryptoLocker. 19 CryptoLocker 2.0: New version or Copycat?.18 How to allow specific applications to run when using Software Restriction Policies.17 How to prevent your computer from becoming infected by CryptoLocker.16 How to determine which computer is infected with CryptoLocker on a network.15 How to find files that have been encrypted by CryptoLocker.14 How to restore files that have been encrypted on DropBox folders.13 How to restore files encrypted by CryptoLocker using Shadow Volume Copies.12 Messages from the ransomware author and information about the CryptoLocker Decryption Service.11 How to increase the time you have to pay the ransom.10 What to do if your anti-virus software deleted the infection files and you want to pay the ransom!.8 Known Bitcoin Payment addresses for CryptoLocker.7 How do you become infected with CryptoLocker.6 Will paying the ransom actually decrypt your files?.5 Is it possible to decrypt files encrypted by CryptoLocker? *Updated 8/6/14*.4 What should you do when you discover your computer is infected with CryptoLocker?.3 Known file paths and registry keys used by CryptoLocker.
