Remove UIWIX Ransomware – Restore .UIWIX Files (Update May 2017) - How to, Technology and PC Security Forum |

Remove UIWIX Ransomware – Restore .UIWIX Files (Update May 2017)

This article has a goal to show you how to remove the new UIWIX ransomware outbreak and restore your files in the event that they have been encrypted with .UIWIX extension.

The initially spotted in the beginning of May 2017 UIWIX ransomware infection has been reported to continue to be massively spread and take advantage of new exploits. And not just any exploits – the same exploits which are used by WannaCry ransomware. The virus may also begin to infect automatically, similar to WannaCry and users are warned to be extremely careful when it comes to this infection as well. In case your computer has been infected by the UIWIX infection, recommendations are to remove it and restore any files encrypted by it by reading the following material.

Threat Summary


.UIWIX Ransomware

Short DescriptionEncrypts important files on the computers it infects and then demands 0.12 BTC ransom payoff to decrypt them.

SymptomsUses the .UIWIX file extension which it adds to the encrypted files. Then demands victims to pay a ransom in a ransom note, named _DECODE_FILES.txt
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by .UIWIX Ransomware


Malware Removal Tool

User ExperienceJoin our forum to Discuss .UIWIX Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.UIWIX Ransomware – How Does It Infect

The infection process of this ransomware virus is comprised by a mix of different tools to conduct the infection:

  • Exploits for all the SMB versions, used by WannaCry ransomware.
  • Malcious macros.
  • Infection software (Droppers, Loaders).
  • Malicious spamming software.
  • Worms or Botnet infections.
  • A pre-configured list of e-mail addresses that are spammed.

This may result in the sending of multiple different types of spammed e-mails. These spammed e-mails may include various different malicious files uploaded as e-mail attachments. The files are presented as legitimate documents in convincing messages, like the one in the example below:

Some e-mails may even contain embedded malicious macros which may pretend to allow the user to view their content after the macros have been enabled, which causes the infection:

Other methods of spreading the .UIWIX file virus may be via more sophisticated malware such as botnet infections, Trojans that have previously infected a system as well as worm infections that spread automatically from a computer to computer.

.UIWIX File Ransomware – Malicious Activity

As soon as the inevitable has happened, the loader of UIWIX ransomware drops the malicious files of the virus in various Windows folders, under different names, for example:

After the files are dropped, UIWIX ransomware obtains administrative permissions over the victim’s computer.As soon as these are obtained the virus may focus on deleting:

  • System Restore Points.
  • Windows shadow copies.

This is achievable by executing the bcedit and vssadmin commands with elevated privilege in Windows command prompt:

After this has been conducted, the ransomware may also heavily modify the Windows Registry Editor and target the Run and RunOnce registry keys, that have the following locations:


In those keys, the UIWIX ransomware virus may create multiple different values with custom data within them that have random names.

In addition to having dropped the malicious files on the compromised computer, UIWIX ransomware also drops the ransom note In a text file, named _DECODE_FILES.txt. It has the following content:

>>> ALL YOUR PERSONAL FILES ARE DECODED <<< Your personal code: {uniqueID} To decrypt your files, you need to buy special software. Do not attempt to decode or modify files, it may be broken. To restore data, follow the instructions! You can learn more at this site: {TOR-based web page} If a resource is unavailable for a long time to install and use the tor browser. After you start the Tor browser you need to open this link {TOR URL}

The virus also redirects to a custom TOR-based web page, where after entering human verification CAPTCHA, the victim is led to the following screen:

The Encryption of UIWIX

When it comes to encrypting files, UIWIX ransomware does not mess about. The virus looks for important files and is very careful to skip system folders, like:

  • %Windows%
  • %AppData%
  • %System32%
  • %Local%
  • %LocalLow%
  • %Roaming%

Other than that, the following file types may be encrypted if your computer was infected by UIWIX ransomware:

  • Audio files.
  • Image file types.
  • Archives.
  • Virtual drive files.
  • Documents.
  • System image files.
  • Multiple video file types.

After UIWIX attacks your computer, the virus replaces blocks of data from the original files with encrypted data and then generates a unique decryption key which corresponds to that data. This key can only be obtain if the ransom of approximately 0.12 BTC is paid which is NOT ADVISABLE. After encryption, the files may appear like the following:

Remove UIWIX Ransomware and Restore .UIWIX Encrypted Files

For the removal of UIWIX ransomware, we strongly advise you to follow the removal instructions below. They are specifically designed to remove the ransomware either manually or automatically. Malware researchers strongly recommend using an anti-malware program for the removal, since it will be complete and future protection is also ensure. Note that you can only install anti-malware program while not in Safe Mode, but you can later boot into Safe Mode for the removal process.

If you wish to restore your files in the event that they have been encrypted with an added .UIWIX file extension, you can now try the alternative methods in step “2. Restore files encrypted by .UIWIX Ransomware” below. They are specifically designed to help restore at least some of the data encrypted by this virus, but make sure to create copies of your files before using them.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share