Schwerer Ransomware – Remove It and Restore Your Files
THREAT REMOVAL

Schwerer Ransomware – Remove It and Restore Your Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by Schwerer and other threats.
Threats such as Schwerer may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article will help you remove Schwerer ransomware absolutely. Follow the ransomware removal instructions at the end of the article.

Schwerer is how a newly emerged ransomware cryptovirus is called. The virus is written in the AutoIt scripting language. The AES algorithm is used for the encryption process or at least that is what is stated in the ransom message. After encryption, your files will become inaccessible as the Schwerer cryptovirus will leave a ransom note with demands for payment. Proceed to read below and see how you could try to potentially restore some of your files.

Threat Summary

NameSchwerer
TypeRansomware
Short DescriptionThe ransomware virus encrypts files on your computer and demands payment for unlocking them.
SymptomsThe ransomware will encrypt your files and then display a distinctive ransom message inside a window, after the encryption process is set and done.
Distribution MethodSpam Emails, Email Attachments, Executables
Detection Tool See If Your System Has Been Affected by Schwerer

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Schwerer.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Schwerer Ransomware – Update

Update! A “restore key generator” (decrypter) is now available for the Schwerer ransomware! The tool was created by the malware researcher Jiri Kropac and can be downloaded from the following link, wrapped inside a .zip archive: Restore Key Generator.

Schwerer Ransomware – Infection Spread

The Schwerer ransomware could spread its infection by using different methods. The payload file that initiates the malicious script for this ransomware that in turn infects your computer system is seen on the Web. Malware researchers have found a sample of the virus. You can see the sample and the detections of multiple security program vendors on the VirusTotal service by checking out the snapshot right here below:

Schwerer ransomware could also distribute its payload file on social media and file-sharing networks. Freeware which is found online could be presented as helpful but at the same time could be hiding the malicious script for the cryptovirus. Don’t open files immediately after downloading them, before you have checked them with a security tool. That goes especially if they come from dubious sources such as links and e-mails. Don’t forget to check the size and signatures of these files for anything that seems out of the ordinary. You should read the ransomware preventing tips thread in the forum.

Schwerer Ransomware – Technical Description

Schwerer ransomware is a virus that is written with the AutoIt language. AutoIt is a freeware BASIC-like scripting language. The ransomware is made to encrypt files on a computer machine and ask for a ransom.

The Schwerer ransomware could make entries in the Windows Registry to achieve persistence, launch or repress processes in Windows. Some entries are designed in a way that will start the virus automatically with each launch of the Windows Operating System. The following registry entry is entered by the virus:

→”HKCU\Software\Other\Schwerer” ,”complete” , “REG_SZ”

Whenever the encryption process is fully complete, a ransom note will be displayed in a window box. The note is written in the English language. Inside the window, you will find instructions on what to do for the restoration of your files.

You can preview the ransom note message here:

The ransom note reads the following:

All your computer file were encrypted with AES, only we can restore your files.
How to restore files :
Files encrypted : 2821
1. Send email to [email protected] containing your personal identifier (it is below)
2. We will send you a Bitcoin address, you must send 150€ to it within 3 days.
IF YOU DO NOT UNDERSTAND BITCOIN EMAIL WILL CONTAIN INFORMATIONS
3. Once full amount is sent you email us again. (make sure to contain key)
A. We will send you key and you will paste into textbox below, that will restore files.
Your Identifier: 14df8b3376dd29b731f2c7ec8f610df8b33764a608
Restore key:
Restore files

From the ransom note of the Schwerer virus, we can see that the TOR network is used for the contact e-mail left by the cybercriminal. You should NOT pay, nor contact the criminal. The demanded ransom sum is precisely 150 Euros. If you pay, no guarantee exists in the world that you will recover your files back to normal. Moreover, giving money to crooks is very likely to motivate them to keep making more ransomware viruses or do other criminal activities.

Schwerer Ransomware – Encryption Process

Schwerer ransomware seeks to encrypt lots of files with different file extensions. Currently, the following list with file extensions is believed to be the main target for the encryption process of this ransomware:

→.7z, .bmp, .doc, .docm, .docx, .html, .jpeg, .jpg, .mp3, .mp4, .pdf, .php, .ppt, .pptx, .rar, .rtf, .sql, .tiff, .txt, .xls, .xlsx, .zip

Those are the most commonly used files by most Windows users. Every file that gets locked will be encrypted with the AES algorithm or at least that is what is stated inside the ransom note.

The Schwerer cryptovirus is quite possible to delete the Shadow Volume Copies from the Windows operating system by utilizing the following command:

→vssadmin.exe delete shadows /all /Quiet

If the command is indeed executed, the encryption process will become more viable that way, as one of the ways for decrypting your files will be gone. Continue reading and see what kinds of ways you can try out to potentially restore some of your files.

Remove Schwerer Ransomware and Restore Your Files

If your computer got infected with the Schwerer ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Note! Your computer system may be affected by Schwerer and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as Schwerer.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove Schwerer follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove Schwerer files and objects
2. Find files created by Schwerer on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by Schwerer

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...