XUY Ransomware

Also Known As: XUY virus
Distribution: Low
Damage level: Severe

XUY ransomware removal instructions

What is XUY?

Discovered by MalwareHunterTeam, the XUY virus is categorized as ransomware and likely to be based on another ransomware virus called Thron, which is essentially an updated version of Tron. Once installed, this virus encrypts files and blocks access to certain system tools such as Task Manager. It renames encrypted files by adding the ".xuy" extension. For example, "sample.jpg" becomes "sample.jpg.xuy". XUY also displays a pop-up window that contains a ransom demand message.

According XUY's ransom demand message, all files have been encrypted and there is a 12-hour deadline to pay the ransom. Victims are encouraged to pay 400 Euros in Bitcoins to a crypto-wallet address provided. Once the ransom is paid, victims must send proof (a photo/screenshot) to the luxenburg@cock.lu email address. XUY developers supposedly then provide a decryption key required to unlock files. Cyber criminals warn victims that they will not provide a decryption tool if there are any attempts to decrypt files manually. They also claim that any attempts to decrypt the files without contacting them will result in damaged files/registry and a "dead" PC. Do not contact XUY developers - cyber criminals usually ignore victims and do not provide the promised decryption tools whether or not ransom demands are met. Unfortunately, there are no tools capable of file decryption free of charge. The only way to retrieve encrypted data is to use a backup and restore it from there.

Screenshot of a message encouraging users to pay a ransom to decrypt their compromised data:

XUY decrypt instructions

There are many examples of ransomware viruses, including Impect, AUDIT, and Supportfiless24. Studying these viruses, you will note that they all are very similar. Frequently, ransomware developers use them to lock users' files and to demand ransom payments for the return of encrypted files. Different ransomware developers demand differing ransom sums and use different cryptography algorithms - these are the main differences between ransomware viruses. Nevertheless, it is generally impossible to decrypt files without the involvement of ransomware developers. Therefore, we recommend that you maintain regular data backups and store them on an unplugged storage device or remote server.

How did ransomware infect my computer?

It is not known exactly how XUY infects systems, however, some most common methods used by cyber criminals include spam email campaigns, trojans, fake software updaters, and third party software download sources to proliferate their viruses. Spam campaigns proliferate viruses through malicious attachments. Cyber criminals send emails that contain malicious Microsoft Office document, PDF or executable files, archives, or other files, and hope that recipients open these attachments. Once opened, these malicious attachments download and install computer infections. Trojans are used to cause chain infections: if a trojan is installed on a computer, it can proliferate other viruses including ransomware. Fake software updaters usually proliferate viruses by downloading and installing them (rather than the promised updates) or exploiting outdated software flaws and bugs. Third party software download tools can be also used to proliferate viruses. Cyber criminals often use torrents, free file hosting/freeware download websites, and other similar sources to trick people into installing viruses rather than the promised software.

How to protect yourself from ransomware infections?

Be cautious when browsing the internet and installing/downloading or updating software. If you receive an email sent from an unknown/untrustworthy address that includes an attachment  - do not open anything without carefully studying it first. Avoid opening attachments presented in irrelevant emails. Keep installed software updated using implemented functions or tools provided by official developers only. Do not download software from untrustworthy/unofficial websites, using third party downloaders, or other similar sources - these tools are likely to include rogue apps. Have a reputable anti-spyware or/and anti-virus software installed and keep it enabled (and updated) at all times. The key to safety is caution. If your computer is already infected with XUY, we recommend running a scan with Spyhunter for Windows to automatically eliminate this ransomware.

Text presented in XUY ransomware pop-up window:

YOUR PC XUY BALLS xD
"Works for XUY"
Your personal files were encrypted.
You have 12 hours to decrypt the files.
For interpretation of it came bitcoins for 400€ at this address: 12ZhVHBfxdwsstomsT6mzz18jTKN7uTc2r
Send evidence photos to the address luxenburg@cock.lu
Then we will send you the recovery tool via email!
If there is no payment, all data will be merged into The Internet.
Any attempt to destroy this program will destroy All your decryptions.
Any attempt to decrypt files will damage your files.
NOTICE. Even if you fix the MBR, your PC is dead.
The whole registry is ****** and your files are infected.

Screenshot of files encrypted by XUY (".xuy" extension):

huy-folder

XUY ransomware removal:

Instant automatic removal of XUY virus: Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of XUY virus. Download it by clicking the button below:
▼ DOWNLOAD Spyhunter By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. Free scanner checks if your computer is infected. To remove malware, you have to purchase the full version of Spyhunter.

Quick menu:

Step 1

Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.

Safe Mode with Networking

Video showing how to start Windows 7 in "Safe Mode with Networking":

Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.

Windows 8 Safe Mode with networking

Video showing how to start Windows 8 in "Safe Mode with Networking":

Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.

windows 10 safe mode with networking

Video showing how to start Windows 10 in "Safe Mode with Networking":

Step 2

Log in to the account infected with the XUY virus. Start your Internet browser and download a legitimate anti-spyware program. Update the anti-spyware software and start a full system scan. Remove all entries detected.

If you cannot start your computer in Safe Mode with Networking, try performing a System Restore.

Video showing how to remove ransomware virus using "Safe Mode with Command Prompt" and "System Restore":

1. During your computer start process, press the F8 key on your keyboard multiple times until the Windows Advanced Options menu appears, and then select Safe Mode with Command Prompt from the list and press ENTER.

Boot your computer in Safe Mode with Command Prompt

2. When Command Prompt mode loads, enter the following line: cd restore and press ENTER.

system restore using command prompt type cd restore

3. Next, type this line: rstrui.exe and press ENTER.

system restore using command prompt rstrui.exe

4. In the opened window, click "Next".

restore system files and settings

5. Select one of the available Restore Points and click "Next" (this will restore your computer system to an earlier time and date, prior to the XUY ransomware virus infiltrating your PC).

select a restore point

6. In the opened window, click "Yes".

run system restore

7. After restoring your computer to a previous date, download and scan your PC with recommended malware removal software to eliminate any remaining XUY ransomware files.

To restore individual files encrypted by this ransomware, try using Windows Previous Versions feature. This method is only effective if the System Restore function was enabled on an infected operating system. Note that some variants of XUY are known to remove Shadow Volume Copies of the files, so this method may not work on all computers.

To restore a file, right-click over it, go into Properties, and select the Previous Versions tab. If the relevant file has a Restore Point, select it and click the "Restore" button.

Restoring files encrypted by CryptoDefense

If you cannot start your computer in Safe Mode with Networking (or with Command Prompt), boot your computer using a rescue disk. Some variants of ransomware disable Safe Mode making its removal complicated. For this step, you require access to another computer.

To regain control of the files encrypted by XUY, you can also try using a program called Shadow Explorer. More information on how to use this program is available here.

shadow explorer screenshot

To protect your computer from file encryption ransomware such as this, use reputable antivirus and anti-spyware programs. As an extra protection method, you can use programs called HitmanPro.Alert and EasySync CryptoMonitor, which artificially implant group policy objects into the registry to block rogue programs such as XUY ransomware.

Note that Windows 10 Fall Creators Update includes a "Controlled Folder Access" feature that blocks ransomware attempts to encrypt your files. By default, this feature automatically protects files stored in the Documents, Pictures, Videos, Music, Favorites as well as Desktop folders.

Controll Folder Access

Windows 10 users should install this update to protect their data from ransomware attacks. Here is more information on how to get this update and add an additional protection layer from ransomware infections.

HitmanPro.Alert CryptoGuard - detects encryption of files and neutralises any attempts without need for user-intervention:

hitmanproalert ransomware prevention application

Malwarebytes Anti-Ransomware Beta uses advanced proactive technology that monitors ransomware activity and terminates it immediately - before reaching users' files:

malwarebytes anti-ransomware

  • The best way to avoid damage from ransomware infections is to maintain regular up-to-date backups. More information on online backup solutions and data recovery software Here.

Other tools known to remove XUY ransomware: