A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0 & CryptoWall 3.0
is provided by Grinler
(aka Lawrence Abrams
), in this topic: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ
Reading that Guide will help you understand what CryptoWall does and provide information for how to deal with it.
Cryptowall typically deletes (though not always) all Shadow Volume Copies with vssadmin.exe so that you cannot restore your files via System Restore
or using a program like Shadow Explorer
...but it never hurts to try in case the infection did not do what it was supposed to do. Another possible option is to try file recovery software
such as R-Studio or Photorec to recover some of your original files but there is no guarantee that will work.
At this time there is no fix tool and Decryption of any CryptoWall Files...is impossible
since there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom. CryptoWall ransomware encrypts data using RSA encryption
...everyone has their own individual private key which cannot be used with someone else's encrypted files. CryptoWall generates the individual private keys on their C2 server and only the public key is sent over the wire. The only other alternative is to save your data as is and wait for a possible breakthrough...meaning, what seems like an impossibility at the moment (decryption of your data), there is always hope someday there may be a possible solution so save the encrypted data and wait until that time.
There are also ongoing discussions in these topics:
Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in one of those topic discussions. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.
The BC Staff