Infected with Gw3w ransomware? Need to decrypt your files?

What is Gw3w ransomware

Gw3w ransomware is a new crypto-trojan called ransomware. According to some users, it is similar to B2DR ransomware threat. It encrypts the user data files, such as .doc, .xls office documents, PDF files, PNG photos, music, other media and so on. It also changes the files suffixes to or reycarnasi1983@torbox3uiot6wchz.onion. The main encryption algorithm is AES-256 and it should be noted that it is very difficult to restore the files without special knowledge or tools. The main purpose of the cyber scammers is to demand a payment for decryption tool, that’s why you can notice the following message:

Gw3w Ransomware

With following contains:

Your files were encrypted with AES-256.

Ask how to restore your files by email

Use only,,
Messages written from other mail services we can not get.

We always respond to messages. If there is no answer within 24 hours, then write us with another email service.


If within 24 hours you have not received a response, you need to follow the following instructions:

a) Download and install TOR browser:
b) From the TOR browser, follow the link: torbox3uiot6wchz.onion
c) Register your e-mail (Sign Up)
d) Write us on e-mail: reycarnasi1983@torbox3uiot6wchz.onion
ATTENTION: e-mail (reycarnasi1983@torbox3uiot6wchz.onion) accepts emails, only with e-mail registered in the TOR browser at torbox3uiot6wchz.onion


Any actions on your part over encrypted files can damage them. Be sure to make backups!


According to the contents of this note, attackers offer decryption tool for BTC 0.01. Why cryptocurrency? Only because of saving a confidentiality. Note, do not pay them in any way. They can easily trick you. You can always use our recommendations listed below to get rid of Gw3w Ransomware and decrypt your files or contact us for decryption. If you have any difficulties with our instruction, please write us on, we can really help to decrypt or reycarnasi1983@torbox3uiot6wchz.onion files.

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. Also check following website for possible decryptor: Emsisoft Decryptors.

How Gw3w Ransomware infected your PC

In most cases, Gw3w Ransomware comes through an unprotected network, complete with free software. Gw3w Ransomware is hidden in specially designed downloaders and installers. Also, in some cases, it takes the form of e-mail attachments. We advise you to use special utilities that can protect your PC from similar threats. If your computer is already infected, then there are ways to remove Gw3w Ransomware.

HitmanPro.Alert with CryptoGuard.

First of all don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the Gw3w Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to Gw3w Ransomware – files, folders, registry keys.


Download Norton*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.

Step 2: Remove following files and folders of Gw3w Ransomware:

Related connections and registry entries:

Related files:

How to decrypt files infected by Gw3w Ransomware?

Use automated decryption tools

kaspersky rakhni decryptor for Gw3w Ransomware

There is ransomware decryptor from Kaspersky that can decrypt Gw3w files. It is free and may help you restore files encrypted by Gw3w Ransomware virus. Download it here:

Download Kaspersky RakhniDecryptor

You can also try to use manual methods to restore and decrypt your files.

Decrypt files manually

Restore the system using System Restore

system restore

Although, latest versions of Gw3w Ransomware remove system restore files, this method may help you to partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged. This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Restore files using shadow copies


  1. Download and run Stellar Data Recovery.
  2. Select type of files you want to restore and click Next.
  3. Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
  4. Once the scanning process is done, click Recover to restore your files.

Protect your computer from ransomware

hitmanpro alert with cryptoguard

Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.

Download HitmanPro.Alert with CryptoGuard

Written by Tim Kas

Leave a Reply

Time limit is exhausted. Please reload CAPTCHA.