There's currently a Support thread open for the Cryptowall infection. I suggest you to go post in it to seek assistance and ask your questions. This way, all the information about the Cryptoware will be centralized in one thread and it'll avoid having hundreds of them created for the same issue. The Support thread can be found in the link below.CryptoWall - new variant of CryptoDefense
Also, Cryptowall runs a command that delete all the Shadow Volume Copy files stored on the system, which prevents you from recovering your files using the "Previous Versions" method. You can always check if you can, in case the command didn't run or didn't run properly. Shadow Explorer
is a free program that you can use to navigate throught your shadow copies and can be easier to use in opposition to Windows' native explorer. Also, you can try to use free data recovery software to recover your files, but there's no guarantee that it'll work. Some of these free data recovery software are:
Take in consideration that none of these software guarantee that they'll be able to recover everything, if not anything at all. Plus, since they are free software, they have a data recovery limit as well (ranging between 1 and 10GB).
In the future, if you want to prevent this type of infection (Cryptoware) from hitting you again, I suggest you to use one of the programs below to protect your system since they aim at stopping Cryptoware from infecting your system and/or the main process to encrypt your files, on top of having a good back-up plan in place.
Meanwhile, if you want to learn more about Cryptowall: how you get infected, how you can prevent it from happening in the future, what methods you can use to try to restore your files, I suggest you to read the Cryptowall FAQ hosted on BleepingComputer.CryptoWall and HELP_DECRYPT Ransomware Information Guide and FAQ
This being said, I contacted a Moderator to get this thread closed to avoid confusion.
And to answer your question, open one of the ransom note (the text file one is easiest), and it'll tell you if you are infected with Cryptowall 3.0. The ransom should look like:
What happened to your files ?
All of your files were protected by a strong encryption with RSA-2048 using CryptoWall 3.0.
More information about the encryption keys using RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem)
What does this mean ?
This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them,
it is the same thing as losing them forever, but with our help, you can restore them.
How did this happen ?
Especially for you, on our server was generated the secret key pair RSA-2048 - public and private.
All your files were encrypted with the public key, which has been transferred to your computer via the Internet.
Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server.
What do I do ?
Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed.
If you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist.
For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below:
If for some reasons the addresses are not available, follow these steps:
1.Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en
2.After a successful installation, run the browser and wait for initialization.
3.Type in the address bar: (REMOVED)
4.Follow the instructions on the site.
Your personal page: (REMOVED)
Your personal page (using TOR): (REMOVED)
Your personal identification number (if you open the site (or TOR 's) directly): (REMOVED)