Remove 7ev3n Ransomware and Restore .r5a Encrypted Files - How to, Technology and PC Security Forum |

Remove 7ev3n Ransomware and Restore .r5a Encrypted Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)


There is a new ransomware on the loose. It is called 7ev3n ransomware. To remove it and see how you can decrypt your files, you should carefully read the whole article.

The ransomware searches for files with widely-used extensions and then encrypts them. In the ransom message, the payment option for getting a decryption key is in BitCoins.

Threat Summary

Name7ev3n Ransomware
Short DescriptionThe ransomware encrypts files with commonly used extensions and asks for 13 BitCoins to decrypt them.
SymptomsFiles get encrypted and become unusable. A ransom message appears with instructions for the decryption process.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks
Detection Tool See If Your System Has Been Affected by 7ev3n Ransomware


Malware Removal Tool

User ExperienceJoin our forum to follow the discussion about 7ev3n Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

7ev3n Ransomware – Delivery

The 7ev3n ransomware may be delivered through several channels. One of them is via spam emails containing malicious email attachments. If you open such an attachment, the malware is set free. Malicious code may be hidden inside the sole body of the email, so just by opening such an email, you can get infected, even without clicking on an attachment.

Other channels for delivery are social networks and file sharing services, which may have similar attachments and files containing the 7ev3n ransomware. Most commonly it is disguised as a useful application, needed update or something similar. Visiting untrusted sites and redirects may lead to malware.

7ev3n Ransomware – Technical Information

7ev3n is classified as a ransomware virus. When it is on your computer, before starting the encryption process, it first performs other malicious actions. First a Trojan is put usually under the name UAC.exe, along with A13-1.exe and System.exe. For persistence and running with each start of Windows, it creates the following two registry values in the Windows Registry, both tied with the System.exe file:




Then, 7ev3n spreads multiple text file copies of the ransom message.

Here is what the ransom message states:


All your documents, photos, databases, office projects and other important files have been encrypted with strongest encryption algorithm and unique key, original files have been overwritten, recovery tools and software will not help. Private key is stored on a server and nobody can decrypt your files until you pay and obtain the private key.

You have only 96 hours to make a payment. If you do not send money within provided time, private key will be destroyed, and all your files will be lost. Follow the instructions:

1. Pay amount of 13 bitcoin (approximately 4980 USD) to address: bitcoin address, this unique address generated only for you.

2. Transaction will take about 50 minutes to accept and confirm the payment, decryption and uninstalling of this software will start automatically. For correct key and decryption, DO NOT: power off computer, disable Internet connection, run antivirus program. Usually decryption will take about 1-3 hours, average decrypt speed 21gb per hour.

Bitcoin is a digital currently that you can buy on ‘’, ‘’, ‘’, ‘’ and many other online and physical exchangers through credit card, bank account, using PayPal and many other payment methods.

Warning, do not try to get rid of this program, any action taken will result in decryption key being destroyed, you will lose your files forever, one way to get you files os to follow that instructions. In case of non-payment reserve the right to publicly publish all encrypted files.

Afterward, 7ev3n ransomware is known to search for and encrypt files with these extensions:

→ .doc, .txt, .xls, .xlsx, .xml, .docx, .html, .jpg, .js, .mdb, .odt, .pdf, .php, .png, .ppt, .pptx, .sql

This is not a complete list as there might be other file extensions that are encrypted. It changes the file extension of all encrypted files to .r5a.

The 7ev3n ransomware demands a really high sum of money for decryption compared to many different ransomware types. As you can see from the ransom note, 13 BitCoins is a lot. Now, as this article is being written, that is around 5140 dollars. In the ransom note, there are even examples being given from where to buy BitCoins. We strongly advise you NOT to pay as there is absolutely no guarantee that you will receive a decryption key, let alone a working one.

At this moment, it is unknown if Shadow Volume Copies are deleted from the Windows operating system. Thus, after removing the virus, you should see the 4th section of the instruction guide written below for a few ways in which you can try to restore your files.

Remove 7ev3n Ransomware and Restore .r5a Encrypted Files

If you have been infected by 7ev3n, you should have some experience in removing malware. This ransomware can lock your files irreparably, so it is highly recommended that you act swiftly and follow the step-by-step guide provided down here:


Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share