How to remove CryptoDefense virus and restore your files
CryptoDefense virus is another nasty ransomware software and acts as the Cryptolocker or Cryptorbit viruses. More specifically when it infects your computer, it encrypts all the files in it. The bad news with these viruses is that, once they infect your computer, they encrypt critical files with strong encryption and it is practically impossible to decrypt them. Specifically after the infection, the CryptoDefense Ransomware informs the user that “All files including videos, photos and documents on user’s computer are encrypted” and in order to decrypt them, then the user must make a payment (of 500$ or 600$) in BitCoins, by following a specific procedure using Tor Internet Browser.
The full CryptoDefense information message is as follows:
“All files including videos, photos and documents on your computer are encrypted with CryptoDefense software..
Encryption was produced using a unique public key RSA-2048 generated for this computer. To decrypt files, you need to obtain the private key.
The single copy of the private key, which will allow you to decrypt the files, located on a secret server on the Internet; the server will destroy the key after a time specified in this window. After that, nobody and never will be able to restore files.
In order to decrypt the files, open your personal page to https://r/23sfxctgp53imlvzk.onion.to/index.php and follow the instructions.
If https://r/23sfxctgp53imlvzk.onion.to/index.php is not opening, please follow the steps below:
1. You must download and install this browser http://www.torproject.org/projects/torbrowser.html.en
2. After installation, run the browser and enter the address: 23sfxctgp53imlvzk.onion.to/….
3. Follow the instructions on the web-site. We remind you that the sooner you do, the more chances are left to recover the files.
IMPORTANT INFORMATION:
Your Personal PAGE:https://r/23sfxctgp53imlvzk.onion.to/….
Your Personal PAGE (Using TorBrowser)
23sfxctgp53imlvzk.onion.to/….
Your Personal code (if you open site directly) “
The CryptoDefense is not a virus, but a malware software and it probably infects your computer when you open a spam email with an attachment commonly in PDF or ZIP format. Once CryptoDefense infects your computer, then it starting to encrypt your files with strong encryption, and is practically impossible to decrypt your files.
During CryptoDefense infection the malicious program also creates 2 files (HOW_DECRYPT.HTML, HOW_DECRYPT.TXT) on every folder that it encrypts its contents with instructions for payment and decrypting.
From our research on several sites, we can inform our readers that in some cases, the files remain encrypted, despite the fact that the user makes the payment. So make this decision (to pay to unlock your files) at your own risk.
If you want to remove CryptoDefense infection from your computer, you must realize that your files will remain encrypted, even if you disinfect your computer from this nasty malware. If you take this decision (to disinfect your computer) and you haven’t a clean backup of your files in another storage device (e.g. a USB Hard disk) then you have the following options to get your files back:
Option 1. If you own Windows 7 or later operating system and the System Restore feature was enabled on your computer then you can try to restore your files from shadow copies by using Windows' “Restore previous versions” (Shadow Copies) feature found at the latest operating systems.
Option 2. If System Restore was disabled on your computer (e.g after a virus attack) and you are infected with the CryptoDefense ransomware before 1ST APRIL 2014 then, thanks to EMSISOFT security company, you can try the “Emsisoft Decrypter” utility to decrypt (fix) your encrypted files. *
* Note: The creators of CryptoDefense ransomware made a big mistake at the first version of CryptoDefense virus: They leave the decryption key on the infected computer. So, if a user is infected before 1st April 2014, then he can decrypt his files using Emsisoft Decrypter utility. But unfortunately for all other users who infected after 1st April 2014, the encryption cannot be removed by using Emsisoft Decrypter utility and the files remain encrypted.
ONCE MORE: DO NOT CONTINUE TO REMOVE CryptoDefense VIRUS UNLESS:
YOU HAVE A CLEAN BACKUP COPY OF YOUR FILES STORED IN A DIFFERENT PLACE (like an unplugged portable hard disk)
or
YOU DON”T NEED THE ENCRYPTED FILES BECAUSE THEY ARE NOT SO IMPORTANT TO YOU.
or
YOU WANT TO GIVE IT A TRY TO RESTORE YOUR FILES USING SHADOW COPIES FEATURE (Step 4: Option-1) OR BY USING THE Emsisoft Decryptor UTILITY (Step 4: Option-2).
So, if you have taken your final decision, then proceed first to remove CryptoDefense ransomware infection from your computer and then try to restore your files by following the steps below:
How to get rid of CryptoDefense RansomWare & Restore CryptoDefense Encrypted files.
CryptoDefense (HOWDECRYPT) Ransomware Removal Guide
Step 1: Start your computer in “Safe Mode with Networking”
To do this,
1. Shut down your computer.
2. Start up your computer (Power On) and, as your computer is booting up, press the "F8" key before the Windows logo appears.
3. Using your keyboard arrows select the "Safe Mode with Networking" option and press "Enter".
Step 2. Stop and delete CryptoDefense malicious running processes with RogueKiller.
RogueKiller is an anti-malware program written and is able to detect, stop & remove generic malwares and some advanced threats such as rootkits, rogues, worms, etc.
1. Download and save "RogueKiller" utility on your computer'* (e.g. your Desktop)
Notice*: Download version x86 or X64 according to your operating system's version. To find your operating system's version, "Right Click" on your computer icon, choose "Properties" and look at "System Type" section.
2. Double Click to run RogueKiller.
3. Wait until the pre-scan is completed and then read and “Accept” the license terms.
4. Press the “Scan” button to scan your computer for malicious threats and malicious startup entries.
5. Finally, when the full scan is completed, press the "Delete" button to remove all malicious items found.
6. Close “RogueKiller” and continue to the next step.
Step 3. Remove CryptoDefense infection with Malwarebytes Anti-Malware Free.
Download and install one of the most reliable FREE anti malware programs today to clean your computer from remaining malicious threats. If you want to stay constantly protected from malware threats, existing and future ones, we recommend that you install Malwarebytes Anti-Malware Premium:
Malwarebytes™ Protection
Removes Spyware, Adware & Malware.
Start Your Free Download Now!
Quick download & Installation instructions:
- After you click the above link, press at the “Start My Free 14-Trial” option to start your download.
- To install the FREE version of this amazing product, uncheck the “Enable free Trial of Malwarebytes Anti-Malware Premium” option at the last installation screen.
Scan & Clean your computer with Malwarebytes Anti-Malware.
1. Run "Malwarebytes Anti-Malware" and allow the program to update to its latest version and malicious database if needed.
2. When the update process is completed, press the “Scan Now” button to start scanning your system for malware and unwanted programs.
3. Now wait until Malwarebytes Anti-Malware finishes scanning your computer for malware.
4. When the scan has completed, first press the “Quarantine All” button to remove all threats and then click “Apply Actions”.
5. Wait until Malwarebytes Anti-Malware removes all infections from your system and then restart your computer (if required from the program) to completely remove all active threats.
6. After the system restarts, run Malwarebytes' Anti-Malware again to verify that no other threats remain in your system.
Step 4. Restore your files after CryptoDefense infection
Option 1. Restore CryptoDefense encrypted files from Shadow Copies.
After you have disinfected your computer from CryptoDefense virus, then it is time to try to restore your files back to their state prior to the infection. For these methods, we use the Shadow Copy feature which is working excellent at the latest operating systems (Windows 8, 7 & Vista)
Method 1: Restore CryptoDefense encrypted files using Windows “Restore Previous versions” feature.
Method 2: Restore CryptoDefense encrypted files using Shadow Explorer.
Method 1: Restore CryptoDefense encrypted (corrupted) files using Windows “Restore Previous versions” feature.
How to restore CryptoDefense encrypted files using Windows “Restore Previous versions” feature:
1. Navigate to the folder or the file that you want to restore in a previous state and right-click on it.
2. From the drop-down menu select “Restore Previous Versions”. *
3. Then choose a particular version of folder or file and then press the:
- “Open” button to view the contents of that folder/file.
- “Copy” to copy this folder/file to another location on your computer (e.g. you external hard drive).
- “Restore” to restore the folder file to the same location and replace the existing one.

Method 2: Restore CryptoDefense encrypted (corrupted) files using Shadow Explorer.
How to restore CryptoDefense corrupted (encrypted) files using “Shadow Explorer” utility.
ShadowExplorer, is a free replacement for the Previous Versions feature of Microsoft Windows Vista/ 7 / 8. You can restore lost or damaged files from Shadow Copies.
1. Download ShadowExplorer utility from here. (You can either download the ShadowExplorer installer or the Portable version of the program).
2. Run ShadowExplorer utility and then select the date that you want to restore the shadow copy of your folder/files.
3. Now navigate to the folder/file that you want to restore its previous version, right-click on it and select “Export”.
4. Finally specify where the shadow copy of your folder/file will be exported/saved (e.g. your Desktop) and press “OK”.
Option 2. Restore CryptoDefense encrypted files using Emsisoft Decrypter utility.
How to Decrypt (fix) CryptoDefense encrypted (corrupted) files using “Emsisoft Decryptor” utility.
Important Notice: This utility works only for computers infected prior of 1st April 2014.
1. Download “Emsisoft Decrypter” utility to your computer (e.g. your Desktop)
2. When download is completed, navigate to your Desktop and “Extract” the “decrypt_cryptodefense.zip” file.
3. Now double-click to run the “decrypt_cryptodefense” utility.
4. Finally press the “Decrypt” button to decrypt your files.
Info: A detailed tutorial on how to decrypt CryptoDefense encrypted files using Emsisoft’s decrypter utility can be found here: http://www.bleepingcomputer.com/virus-removal/cryptodefense-ransomware-information#emsisoft
That’s it.
We're hiring
We're looking for part-time or full-time technical writers to join our team! It's about a remote position that qualified tech writers from anywhere in the world can apply. Click here for more details.
- How to Send Automatic Replies in Outlook with an Office365/Exchange Account. - December 6, 2023
- How to Send Automatic Replies in Outlook with POP3/IMAP Accounts. - December 4, 2023
- How to Easy Update to Windows 11 23H2 on Unsupported Hardware. - November 29, 2023
May 19, 2016 @ 1:31 am
we got a virus. it has the website payments ending in onion.city onion.cab with the previous the encrypted code given by the virus.
cannot figure out how to get the files back.
the .crypt extensions on the files show on many of the files and the outlook files *.pst are also inaccessible.
have looked the decryptor site – disabled now, tried telsadecrypter and not able to use any of the strategies in the above excellent article.
does anyone else know what to do please. I am still searching the internet but I am running out of options. thanks d
December 11, 2015 @ 8:58 pm
Is this thig real or an another way to get mallware?
January 11, 2016 @ 11:54 am
@Adrian: Yes is real…
January 2, 2015 @ 12:56 pm
i tried ussing the decrypt cryptodefence tool but it says that no key was found… is there any solution to this ??
January 3, 2015 @ 12:23 pm
@Amera: I'm afraid not.
November 17, 2014 @ 5:47 pm
Do you think there will be an option to de-crypt the files using Emsisoft Decrypter utility if I wait for a new solution to be created?
November 18, 2014 @ 11:05 am
In the future…maybe yes.
November 13, 2014 @ 2:16 am
Does it make a difference if I only press Apply Actions and didn't press Quarantine all at all?
Thanks
November 14, 2014 @ 7:32 pm
Hello Joel, If the selected action is Quarantine, doesn't make a difference.
August 27, 2014 @ 4:39 pm
Hi there! On August 26, 2014 have been infected by the virus Trojan Win32 CryptoDefense / Harasom.A and despite having cleaned up my system I find myself with all the files and encrypted with the extension .ctb2. How do I restore it? I also tried restoring the configuration on another date but nothing.
Pending thank you in advance
August 31, 2014 @ 10:19 am
Restore ONLY your files in previous versions as described in this article.