• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

My AntiSpyware

Free antispyware software, Online Scanners, Instructions on how to remove spyware and malware.

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools
Home › Virus › Remove Wyvern virus (Restore decryptorx@cock.li .wyvern files)

Remove Wyvern virus (Restore decryptorx@cock.li .wyvern files)

Myantispyware team September 24, 2017     2 Comments    

Computer security experts discovered a new variant of the BTCWare ransomware which named Wyvern ransomware virus. It appends the .wyvern extension to encrypted file names. This blog post will provide you with all the things you need to know about ransomware virus, how to delete Wyvern virus from your computer and how to restore all encrypted documents, photos and music for free.

wyvern ransomware virus

The Wyvern ransomware virus uses RSA-2048 key (AES 256-bit encryption method). When the virus encrypts a file, it will append the .[decryptorx@cock.li]-id-[id].wyvern extension to each encrypted file. Once the virus finished enciphering of all documents, photos and music, it will drop a file called “HELP.hta” with guide on how to decrypt all files.

The ransom demanding message offers victim to contact Wyvern’s makers (decryptorx@cock.li) in order to decrypt all files. These persons will require to pay a ransom (usually demand for $300-1000 in Bitcoins). We don’t recommend paying a ransom, as there is no guarantee that you will be able to decrypt your documents, photos and music. Especially since you have a chance to recover your photos, documents and music for free using free utilities such as ShadowExplorer and PhotoRec.

Therefore it’s very important to follow the few simple steps below as quickly as possible. The step by step guidance will allow you to remove Wyvern ransomware virus. What is more, the few simple steps below will allow you recover photos, documents and music encrypted by decryptorx@cock.li virus for free.

Table of contents

  1. What is Wyvern ransomware virus
  2. How to decrypt .wyvern files
  3. How to remove Wyvern ransomware
    • How to remove Wyvern with Zemana Anti-malware
    • Use Malwarebytes to remove Wyvern
    • If the problem with Wyvern is still remained
  4. Restoring files encrypted by Wyvern ransomware virus
    • Use shadow copies to recover .wyvern files
    • Restore .wyvern files with PhotoRec
  5. How to prevent your personal computer from becoming infected by Wyvern virus?
    • Run CryptoPrevent to protect your system from Wyvern ransomware virus
  6. To sum up

What is Wyvern ransomware virus

Wyvern ransomware is a variant of crypto viruses (malicious software which encrypt personal files and demand a ransom) from the BTCWare family. It affects all current versions of Windows OS such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10. This ransomware virus uses a hybrid AES + RSA encryption mode to eliminate the possibility of brute force a key that will allow to decrypt encrypted files.

When the ransomware virus infects a machine, it uses system directories to store own files. To run automatically whenever you turn on your computer, Wyvern ransomware creates a registry entry in Windows: sections HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Run, HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ RunOnce, HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Run, HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ RunOnce.

Immediately after the launch, the virus scans all available drives, including network and cloud storage, to determine which files will be encrypted. The virus uses the file name extension, as a way to define a group of files that will be subjected to encrypting. Encrypted almost all types of files, including common as:

wallet, .asset, .wpl, .arch00, .erf, .dwg, .ntl, .zi, .hplg, .ai, .ptx, .mpqge, .xbdoc, .accdb, .wpe, .rtf, .rar, .zabw, .xlsx, .wpd, .itl, .xyw, .jpeg, .m3u, .wps, .xf, .indd, .cfr, .wpt, .upk, .wm, .wbm, .xdl, .sr2, .wp5, .bsa, .bar, .crt, .xpm, .odm, .bkf, .ff, .crw, .vcf, .docm, .xlsm, .xlgc, .dba, .wn, .re4, .zip, .dazip, .wdp, .mcmeta, .vtf, .css, .pem, .hkx, .iwd, .mrwref, .m4a, .pptx, .x, .lrf, .ncf, .ybk, .der, .zdb, .srf, .py, .ws, .x3f, .wma, .mdbackup, .3fr, .tor, .pak, .fos, .wp6, .wbd, .wbk, .xlsm, .itdb, .wsh, .fpk, .eps, .ztmp, .xar, .wp7, .wire, .mef, .xml, .x3d, .webdoc, .lbf, .fsh, .xmind, .rb, .wmd, .wma, .txt, .zw, .odc, .qdf, .cer, .sb, .bc7, .xld, .cr2, .dbf, .wbc, .yal, .t12, .hvpl, .vfs0, .wdb, .doc, .p7c, .map, .litemod, .rim, .csv, .wsd, .arw, .xx, .7z, .desc, .vpk, .jpe, .mddata, .gho, .wpb, .sidd, .wotreplay, .xwp, .avi, .sidn, .wbz, .zip, .srw, .3ds, .x3f, .hkdb, .mlx, .yml, .z, .webp, .xxx, .vdf, .sum, .wri, .xdb, .psd, .apk, .tax, .blob, .wmv, .layout, .flv, .wpa, .lvl, .pkpass, .icxs, .wcf, .das, .xyp, .xlk, .ppt, .ods, .dxg, .xlsx, .sql, .sav, .forge, .mdb, .psk, .wmv, .itm, .pst, .iwi, .dcr, .wsc, .slm, .dng, .ibank, .menu, .0, .orf, .snx, .odt, .gdb, .r3d, .xy3, .1st, .sis, .rgss3a, .odp, .png, .ysp, .mov, .wp4, .zif, .mp4, .big, .js, .wmo, .ltx, .cdr, .t13, .raf, .pdf, .zdc, .rwl, .xmmap, .jpg, .odb, .y, .db0, .rw2, .cas, .xll, .z3d, .bik, .wpw, .wps, .svg, .wot, .dmp, .xbplate, .wgz, .kdc, .bc6, .raw, .bkp, .pptm, .nrw, .kdb, .wpd, .qic, .d3dbsp, .p7b, .pdd, .mdf, .wb2, .epk, .bay, .xlsb, .sid, .wmf, .esm, .syncdb

Once a file is encrypted, its extension replaced to wyvern. Next, the ransomware creates a file named “HELP.hta”. This file contain tutorial on how to decrypt all encrypted photos, documents and music. An example of the tutorial is:

All your files have been encrypted!
All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail decryptorx@cock.li
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files. 
Free decryption as guarantee
Before paying you can send us up to 3 files for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) 
How to obtain Bitcoins
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. 
hxxps://localbitcoins.com/buy_bitcoins 
Also you can find other places to buy Bitcoins and beginners guide here: 
hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins/ 
Attention!
Do not rename encrypted files. 
Do not try to decrypt your data using third party software, it may cause permanent data loss. 
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

The Wyvern ransomware virus actively uses scare tactics by giving the victim a brief description of the encryption algorithm and showing a ransom instructions on the desktop. It is trying to force the user of the infected computer, do not hesitate to pay a ransom, in an attempt to restore their photos, documents and music.

How to decrypt .wyvern files

Currently there is no available method to decrypt wyvern files, but you have a chance to restore decryptorx@cock.li files for free. The virus repeatedly tells the victim that uses RSA-2048 key (AES 256-bit encryption method). What does it mean to decrypt the files is impossible without the private key. Use a “brute forcing” is also not a solution because of the big length of the key. Therefore, unfortunately, the only payment to the makers of the Wyvern ransomware entire amount requested – the only method to try to get the decryption key and decrypt all your files.

There is absolutely no guarantee that after pay a ransom to the creators of the Wyvern ransomware virus, they will provide the necessary key to decrypt your files. In addition, you must understand that paying money to the cyber criminals, you are encouraging them to create a new ransomware virus.

How to remove Wyvern ransomware

The following instructions will allow you to get rid of Wyvern virus and other malicious software. Before doing it, you need to know that starting to remove the ransomware, you may block the ability to decrypt files by paying creators of the ransomware virus requested ransom. Zemana Anti-malware, KVRT and Malwarebytes Anti-malware can detect different types of active viruses and easily delete it from your PC system, but they can not recover encrypted files.




How to remove Wyvern with Zemana Anti-malware

We suggest using the Zemana Anti-malware. You can download and install Zemana Anti-malware to detect and delete Wyvern ransomware from your system. When installed and updated, the malicious software remover will automatically scan and detect all threats exist on the computer.

Zemana remove Wyvern ransomware and other kinds of potential threats like malicious software and potentially unwanted applications

  1. Please go to the following link to download Zemana Anti Malware (ZAM). Save it on your Desktop.
    Zemana AntiMalware
    Zemana AntiMalware
    159598 downloads
    Author: Zemana Ltd
    Category: Security tools
    Update: July 16, 2019
  2. At the download page, click on the Download button. Your web-browser will open the “Save as” dialog box. Please save it onto your Windows desktop.
  3. Once downloading is done, please close all programs and open windows on your personal computer. Next, launch a file named Zemana.AntiMalware.Setup.
  4. This will open the “Setup wizard” of Zemana onto your computer. Follow the prompts and don’t make any changes to default settings.
  5. When the Setup wizard has finished installing, the Zemana will launch and show the main window.
  6. Further, click the “Scan” button .Zemana Free program will scan through the whole system for the Wyvern ransomware related files, folders and registry keys. While the Zemana is checking, you can see number of objects it has identified either as being malicious software.
  7. When the system scan is finished, Zemana will display a list of detected threats.
  8. Review the results once the utility has finished the system scan. If you think an entry should not be quarantined, then uncheck it. Otherwise, simply click the “Next” button. The utility will begin to get rid of Wyvern ransomware virus and other security threats. When that process is complete, you may be prompted to restart the PC system.
  9. Close the Zemana and continue with the next step.

Use Malwarebytes to remove Wyvern

You can get rid of Wyvern ransomware automatically with a help of Malwarebytes Free. We advise this free malware removal utility because it may easily remove viruss, ‘ad supported’ software, PUPs and toolbars with all their components such as files, folders and registry entries.

MalwareBytes Anti-Malware (MBAM) delete Wyvern virus and other malicious software and potentially unwanted software

  1. Visit the page linked below to download MalwareBytes. Save it directly to your Windows Desktop.
    Malwarebytes Anti-malware
    Malwarebytes Anti-malware
    317788 downloads
    Author: Malwarebytes
    Category: Security tools
    Update: April 15, 2020
  2. When downloading is complete, close all applications and windows on your system. Open a directory in which you saved it. Double-click on the icon that’s named mb3-setup.
  3. Further, click Next button and follow the prompts.
  4. Once installation is finished, click the “Scan Now” button to perform a system scan for the Wyvern ransomware and other security threats. This process can take quite a while, so please be patient. While the MalwareBytes Free program is checking, you may see how many objects it has identified as threat.
  5. After finished, MalwareBytes Anti-Malware (MBAM) will produce a list of unwanted and ad supported software programs. In order to remove all items, simply click “Quarantine Selected”. Once the task is done, you can be prompted to restart your PC.

The following video offers a step by step instructions on how to get rid of browser hijackers, ad-supported software and other malware with MalwareBytes Free.

If the problem with Wyvern is still remained

KVRT is a free removal utility that can check your computer for a wide range of security threats such as the Wyvern ransomware, adware, PUPs as well as other malware. It will perform a deep scan of your machine including hard drives and MS Windows registry. When a malware is detected, it will help you to delete all found threats from your personal computer with a simple click.

Download Kaspersky virus removal tool (KVRT) on your PC system from the following link.

Kaspersky virus removal tool
Kaspersky virus removal tool
124031 downloads
Author: Kaspersky® lab
Category: Security tools
Update: March 5, 2018

After the downloading process is done, double-click on the KVRT icon. Once initialization procedure is done, you will see the Kaspersky virus removal tool screen as shown in the figure below.

KVRT main window

Click Change Parameters and set a check near all your drives. Click OK to close the Parameters window. Next press Start scan button to perform a system scan with this utility for the Wyvern ransomware and other malicious software. Depending on your PC system, the scan can take anywhere from a few minutes to close to an hour. While the KVRT program is scanning, you can see count of objects it has identified as threat.

KVRT scanning

When KVRT has finished scanning your computer, KVRT will open you the results as displayed in the figure below.

Kaspersky virus removal tool scan report

Review the results once the utility has finished the system scan. If you think an entry should not be quarantined, then uncheck it. Otherwise, simply click on Continue to start a cleaning procedure.

Restoring files encrypted by Wyvern ransomware virus

In some cases, you can restore files encrypted by Wyvern ransomware. Try both methods. Important to understand that we cannot guarantee that you will be able to restore all encrypted files.




Use shadow copies to recover .wyvern files

If automated backup (System Restore) is enabled, then you can use it to restore all encrypted files to previous versions.

Download ShadowExplorer on your system from the link below.

ShadowExplorer
ShadowExplorer
419441 downloads
Author: ShadowExplorer.com
Category: Security tools
Update: September 15, 2019

After downloading is complete, open a directory in which you saved it. Right click to ShadowExplorer-0.9-portable and select Extract all. Follow the prompts. Next please open the ShadowExplorerPortable folder as displayed on the image below.

ShadowExplorer folder

Double click ShadowExplorerPortable to run it. You will see the a window as displayed on the screen below.

ShadowExplorer

In top left corner, choose a Drive where encrypted files are stored and a latest restore point as displayed on the image below (1 – drive, 2 – restore point).

ShadowExplorer

On right panel look for a file that you want to restore, right click to it and select Export as displayed in the figure below.

ShadowExplorer recover file

Restore .wyvern files with PhotoRec

Before a file is encrypted, the Wyvern ransomware makes a copy of this file, encrypts it, and then deletes the original file. This can allow you to recover your personal files using file recover applications like PhotoRec.

Download PhotoRec by clicking on the following link. Save it to your Desktop.

PhotoRec
PhotoRec
209107 downloads
Author: CGSecurity
Category: Security tools
Update: March 1, 2018

After the download is done, open a directory in which you saved it. Right click to testdisk-7.0.win and select Extract all. Follow the prompts. Next please open the testdisk-7.0 folder as on the image below.

testdisk photorec folder

Double click on qphotorec_win to run PhotoRec for Microsoft Windows. It will show a screen as shown in the following example.

PhotoRec for windows

Select a drive to recover like below.

photorec choose drive

You will see a list of available partitions. Select a partition that holds encrypted photos, documents and music as shown in the figure below.

photorec select partition

Press File Formats button and select file types to restore. You can to enable or disable the recovery of certain file types. When this is complete, click OK button.

PhotoRec file formats

Next, press Browse button to choose where restored photos, documents and music should be written, then press Search.

photorec

Count of recovered files is updated in real time. All restored files are written in a folder that you have chosen on the previous step. You can to access the files even if the recovery process is not finished.

When the recovery is complete, press on Quit button. Next, open the directory where restored documents, photos and music are stored. You will see a contents as shown in the figure below.

PhotoRec - result of restore

All restored photos, documents and music are written in recup_dir.1, recup_dir.2 … sub-directories. If you are searching for a specific file, then you can to sort your recovered files by extension and/or date/time.

How to prevent your personal computer from becoming infected by Wyvern virus?

Most antivirus applications already have built-in protection system against the ransomware virus. Therefore, if your computer does not have an antivirus program, make sure you install it. As an extra protection, run the CryptoPrevent.

Run CryptoPrevent to protect your system from Wyvern ransomware virus

Download CryptoPrevent by clicking on the following link. Save it to your Desktop so that you can access the file easily.

www.foolishit.com/download/cryptoprevent/

Run it and follow the setup wizard. Once the setup is done, you’ll be displayed a window where you can select a level of protection, as on the image below.

CryptoPrevent

Now click the Apply button to activate the protection.

To sum up

Now your system should be clean of the Wyvern ransomware. Delete Malwarebytes and KVRT. We suggest that you keep Zemana Anti-malware (to periodically scan your PC for new viruses and other malware). Moreover, to prevent virus, please stay clear of unknown and third party programs, make sure that your antivirus program, turn on the option to stop or search for ransomware.

If you need more help with Wyvern ransomware related issues, go to our Spyware/Malware removal forum.

 

Virus

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

2 Comments

  1. Rick
    ― November 8, 2017 - 7:05 pm  Reply

    after I realized something was wrong, I reinstalled windows. after I had access to my system I saw that every file on every drive was encrypted, will any of the above methods work on a freshly installed windows? If not is there a link that will help?

  2. Patrik (Myantispyware admin)
    ― November 8, 2017 - 8:59 pm  Reply

    You can try to restore your files by using the PhotoRec (if you did not reformat the drive when you reinstalled windows).

Leave a Reply Cancel reply




New Guides

Topatincompany.com Click Allow Scam
Topatincompany.com Virus Removal Guide
Appcloudactive.com malware
Appcloudactive.com Pop-Up Redirect: How to Remove and Prevent Malicious Redirects
PIONEER FLAME MINI TRIKE Scam
PIONEER FLAME MINI TRIKE Scam: Don’t Be Fooled by Low Prices and Deceptive Advertising
Look Who Died Scam Facebook Message
Look Who Died in an Accident Scam On Facebook Messenger and TikTok
Yourcoolwords.com Click Allow Scam
Yourcoolwords.com Virus Removal Guide

Follow Us

Search

Useful Guides

Iphone Calendar virus spam
Iphone Calendar Virus/Spam 2022 (Removal guide)
Best free malware removal tools
Best Free Malware Removal Tools 2023
How to remove browser hijacker virus (Chrome, Firefox, IE, Edge)
remove android virus
How to remove virus from Android phone
How to reset Google Chrome settings to default

Recent Posts

How to remove Sdcg525s.trade popups [Chrome, Firefox, IE, Edge]
JP-Search.co
How to remove JP-Search.co [Chrome, Firefox, IE, Edge]
All-io.net
How to remove All-io.net [Chrome, Firefox, IE, Edge]
track.aptitudemedia.co
How to remove Track.aptitudemedia.co redirect [Chrome, Firefox, IE, Edge]
Find My Tab
How to remove “Find My Tab” Chrome extension [Virus removal guide]

MYANTISPYWARE.COM

  • About Us
  • Contact Us
  • Privacy Policy

NEED A HELP ?

If you're seeing unwanted pop-ups or ads in your web-browser, you might have an adware installed on your computer. Use the following guide to stop pop-up ads and remove malicious software. Or ask for help here.

Links

  • Downloads
  • Instructions
  • Questions and Answers
  • Free Malware Removal Tools
Copyright © 2004 - 2023 MASW - Myantispyware.com.