Infected with BTCWare Ransomware? Need to decrypt your files?

What is BTCWare Ransomware

Note: Thanks to Bitdefender Labs, there is at least one working decryptor to restore some of encrypted files. If you have .aleta or .blocking extensions, there is a possibility to decrypt some files using instructions below. Article will be updated as soon as new working decryptors appears.

BTCWare PayDay Ransomware belongs to the family of BTCWare Ransomware, that we described in our blog. However, unlike its predecessor it uses more complex AES-256 encryption algorithm, which makes it more difficult to decrypt files. Latest version uses following pattern to modify filenames and extensions: [email]-id-[id-number].payday, .cryptowin, .master, .wyvern, .nuclear, .gryphon, .aleta, .blocking, .onyon, .xfile, .theva, .cryptobyte.

Here is the list of known developer e-mails:

After finalizing encryption process BTCWare PayDay Ransomware opens browser window with instructions to contact developers and pay the ransom. Ransom amount varies between $500 and $1000 and have to be paid in BitCoins. It is not recommended to pay the ransom as there is no guarantee malefactors will send the key. But, this will put your bank details into risk. We recommend you to remove BTCWare PayDay Ransomware (its active part) and preserve affected files for the time decryption utility appears.

BTCWare Ransomware virus

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. Also check following website for possible decryptor: Emsisoft Decryptors.

How BTCWare Ransomware infected your PC

BTCWare PayDay Ransomware usually infects your PC through infected email attachments (be careful, as cyber criminals usually mask their spam malicious emails with attachments into Ebay email or any other popular trusted website), fake software updaters and trojans – that’s why good anti-viruses is vitally important to avoid ransomware threat. You can also get this ransomware on file sharing networks, including torrent files. Ransom is asked to be paid in BitCoins, that also makes the task difficult for the police, as user in this network are often anonymous. Encryption starts in the background. Way to protect your computer from such threats is to use antiviruses with crypto-protection like HitmanPro.Alert with CryptoGuard.

First of all don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer, before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the BTCWare PayDay Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to BTCWare PayDay Ransomware – files, folders, registry keys.


Download Norton*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.

Step 2: Remove following files and folders of BTCWare PayDay Ransomware:

Remove following registry entries:

no information

Remove following files:

no information

How to decrypt files infected by BTCWare PayDay Ransomware (.payday, .cryptowin, .master or other encrypted files)?

Use automated decryption tools

BTCWare Ransomware decrypter

There is ransomware decryptor from Bitdefender Lab that can decrypt .btcware, .cryptobyte, .onyon, .xfile, .cryptowin, .theva, or .master files. It is free and may help you restore encrypted files encrypted by BTCWare Ransomware virus. Download it here:

BTCWare Decryption tool

If you have .aleta or .blocking files, you also can try to use manual methods to restore and decrypt encrypted files.

Decrypt .aleta or .blocking or other encrypted files manually

Restore the system using System Restore

system restore

Although, latest versions of BTCWare Ransomware remove system restore files, this method may help you partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – BTCWare PayDay Ransomware by BTCWare PayDay Ransomware). This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Restore .aleta or .blocking files using shadow or deleted copies


  1. Download and run Stellar Data Recovery.
  2. Select type of files you want to restore and click Next.
  3. Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
  4. Once the scanning process is done, click Recover to restore your files.

Protect your computer from ransomware

hitmanpro alert with cryptoguard

Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.

Download HitmanPro.Alert with CryptoGuard

Information provided by: Alexey Abalmasov

Leave a Reply

Your email address will not be published. Required fields are marked *