.uudjvu Files Virus - How to Remove It

.uudjvu Files Virus – How to Remove It

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This blog post has been made with the main purpose in order to explain how you can remove the .uudjvu files virus from your computer and how to try and restore data encoded by it.

Yet another instance of the DJVU ransomware virus has just appeared. The ransomware seems to carry the .uudjvu file extension appended to the files encrypted by it. The virus aims to encode the files on the computers attacked by it and then set the .uudjvu file extension to the encrypted files as a suffix. The virus reportedly uses RSA and AES encryption to perform its encryption. It then drops a ransom note, called “_openme.txt” and it contains ransom instructions on how the victim can pay a hefty ransom in order to retrieve his or her files back to normal. If your computer was just attacked by the .uudjvu files virus, we would strongly suggest that you read this article thoroughly.

Image Source: Twitter User @SforSuadela

Threat Summary

Name.uudjvu Files Virus
TypeRansomware, Crypto virus
Short DescriptionVariant of the .djvu file ransomware. Encrypts files and wants you to pay ransom in BitCoin to get them back.
SymptomsThe files on the compromised computer are encrypted and the file extension .uudjvu is added. A ransom note, called _openme.txt is also dropped on the victim PC.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .uudjvu Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .uudjvu Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.uudjvu Files Virus – How Does It Infect

The primary infection method used by the creators of this ransomware virus is allegedly malicious e-mails that contain attachments which are actually infection files. This technique also known as malspam is used by cyber-criminals to deceive users that they have received an important e-mail attachment, like a document from a bank, an invoice, a receipt or even something more personal, like a notice that they are being fired from their job. All of this is done with the goal to get the victims to open the attachment and once this is done, the .uudjvu files virus may begin it’s infection process.

Furthermore, in addition to infecting computers via malspam, the .uudjvu files virus may also perform infection via various different types of files that are uploaded on the web. These files may be programs that users tend to download online and often turn out to be:

  • Portable versions of programs.
  • Activators.
  • Cracks.
  • Patches.
  • Key Generators.
  • Drivers.

The files are actually infection files, whose main purpose is to get users to activate them and trigger a Trojan.Dropper or a Trojan.Downloader who drop the payload of .uudjvu files virus on the infected computer system.

.uudjvu Files Virus – More Information

Once the .uudjvu files virus infects your computer, the malware may start to perform a set of malicious activities, starting with dropping the ransomware payload on the computers of victims. The payload may consist of more than one virus file and they could be located In the commonly used Windows folders under different names:

Among the malicious files is also the virus’s ransom note which contains instructions for the victims on how to pay a ransom fee to get their files to work again. The note is named _openme.txt and it has the following message to victims:

———————————————- ALL YOUR FILES ARE ENCRYPTED ———————————————–
Don’t worry, you can return all your files!
All your files documents, photos, databases and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees do we give to you?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information
Don’t try to use third-party decrypt tools because it will destroy your files.
Discount 50% available if you contact us first 72 hours.
To get this software you need write on our e-mail:
Reserve e-mail address to contact us:
Your personal ID:
[redacted 43 alphanumeric chars]

In addition to the ransom note of .uudjvu ransomware, the virus may also connect to the server of the cyber-cyber-criminals who are actually behind it in order to relay information about the infected computer, such as:

  • IP address.
  • Location.
  • Network configuration.
  • Passwords.
  • Content of files.
Take Screenshots from the desktop.
  • Change network settings.

Then, the .uudjvu files virus may continue with it’s malicious activities and go ahead and delete the shadow volume copies of the infected computer. This is done with the main goal of eliminating the possibility for users to recover their files via Windows Recovery options. To reach their end goal, the crooks may have devised a script that deletes these copies by running administrator commands in Windows Command Prompt, some of which may be among the list of commands below:

→ sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

And to get the virus file of the .uudjvu files virus to run automatically when you start Windows, the ransomware may also set registry entries in the following sub-keys, which could contain the actual location of the module, responsible for encryption:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

.uudjvu Files Virus – How Does It Encrypt

In order to render your files temporary obsolete, the .uudjvu files virus may set various different types of procedures in place. One of them is to scan for the commonly used files on your computer and detect and encrypt them based on their file extension. The most commonly encrypted file extensions are usually among the ones below:


After the .uudjvu files virus detects the files on the infected machine that are eligible for encryption, the malware may use one or more of the following encryption algorithms in order to encode files:

  • AES-256
  • RSA-2048
  • Salsa20

The encryption can be done in more than one way, whereas the most common method is to copy the original file and then encrypt the copy by altering data segments from it with the encryption algorithm, enough to make it obsolete. After the encryption is done, the .uudjvu files virus may delete the original files and leave only the encrypted ones, looking, like the example below shows:

→ New Microsoft Word Document.docx.uudjvu

Remove .uudjvu File Ransomware and Try Recovering Data

If you want to remove the .uudjvu files virus, we would suggest that you follow the removal instructions that are underneath this article. They have been created with the main reason to give the ability to remove this ransomware either manually or automatically. If the first two manual removal steps for the .uudjvu ransomware do not seem to be of any help, we would suggest that you follow the automatic removal instructions. They have the instructions to run a scan with an advanced malware removal software, which according to security professionals is the best way to detect and remove all files and folders, related to .uudjvu ransomware.

If you want to try and restore files, encrypted by .uudjvu files virus, we would suggest that you see the file recovery options we have presented below. They have been created to help you to try and get back at least some of your files, although you cannot be sure 100% they will work for all your files.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share