leaves files (ransom notes) with names like HELP_YOUR_FILES.TXT, HELP_YOUR_FILES.HTML and HELP_YOUR_FILES.PNG and will encrypt the actual filename of an encrypted file as well as well as the data contained in it. Each encrypted file will have a unique name with random characters (0ausbffwh.p5, 72lcvn.iv6nn, x83o8x.ux7, etc). CryptoWall 4.0 uses a .JS file to download and execute a file from the %temp% folder. The initial installer injects the program that actually encrypts data into explorer.exe/svchost.exe. More information in this BC news article...
A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0, CryptoWall 3.0 & CryptoWall 4.0
is provided by Grinler
(aka Lawrence Abrams
), in this topic: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ
As with most ransomware infections...the best solution for dealing with encrypted data is to restore from backups
. If that is not a viable option, the only other alternative is to save your data as is and wait for a possible breakthrough...meaning, what seems like an impossibility at the moment (decryption of your data), there is always hope someday there may be a possible solution so save the encrypted data and wait until that time.
There is an ongoing discussion in this topic where you can ask questions and seek further assistance.
Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.
The BC Staff
Note: If further investigation discloses you are not dealing with CryptoWall, send me a PM and I will reopen this topic.