Aliases: Trojan/Win32.Cryptolocker (AhnLab) W32/Ransom.XWLZ-0443 (Command) TR/Crypt.ZPACK.13648 (Avira) Trojan.GenericKDV.1279124 (BitDefender) Trojan.DownLoader10.17256 (Dr.Web) W32/Zbot.GFC!tr (Fortinet) Mal/Ransom-BZ (Sophos) TROJ_FRS.BMA000IP13 (Trend Micro)
Microsoft security software detects and removes this family of threats.
This ransomware family encrypts your files and shows you a webpage that asks you to pay a fee to unlock them.
You can read more about this type of threat on our Ransomware page.
There is no one-size-fits-all response if you have been victimized by ransomware. There is no guarantee that paying the ransom will give you access to your files.
If you've already paid, see our ransomware page for help on what to do now.
Run antivirus or antimalware software
Use the following free Microsoft software to detect and remove this threat:
- Windows Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista
- Microsoft Safety Scanner
You should also run a full scan. A full scan might find other, hidden malware.
You might be able to recover encrypted files by using the tool discussed in the MMPC blog post FireEye and Fox_IT tool can help recover Crilock-encrypted files.
Get more help
If you’re using Windows XP, see our Windows XP end of support page.