UAJS Virus (.uajs File) Ransomware

The Uajs virus belongs to the STOP/Djvu ransomware group and targets Windows computers. It works by encrypting the files on these computers, changing them into files with a “.uajs” extension, and then leaving a ransom note named “_readme.txt” in each folder it affects.

Known as one of the most powerful types of malware, the Uajs virus successfully blocks many different ways that might be used to recover encrypted files.

In this post, I’ll walk you through the events following a Uajs virus attack and guide you on removing the malware from your system. You’ll also discover multiple file recovery methods post-attack.

Understanding the Uajs Virus

The Uajs ransomware, a malicious software targeting user files, encrypts them using a robust Salsa20 cipher, incapacitates antivirus programs, and erases backups. It modifies every document – whether a Word file, Excel spreadsheet, or photo – by appending a Uajs file extension. For instance, “photo.jpg” becomes “photo.jpg.uajs”. It then creates a ransom note called _readme.txt and places it in each folder containing encrypted files on your desktop, which details the ransom payment instructions as follows:

Readme.txt file of Uajs Virus Ransomware
_readme.txt file created by Uajs ransomware


Don't worry, you can return all your files!
All your files like pictures, databases, documents, and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
Do not ask assistants from youtube and recovery data sites for help in recovering your data.
They can use your free decryption quota and scam you.
Our contact is emails in this text document only.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $999.
Discount 50% available if you contact us first 72 hours, that's price for you is $499.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

Reserve e-mail address to contact us:

Your personal ID:

Sharing habits with most STOP/Djvu ransomware variants, the Uajs ransomware represents over 70% of individual ransomware attacks since its 2018 inception. It introduced many features now common across ransomware targeting individuals, such as ransom demands, notification methods, and backup prevention measures.

Uajs Ransomware

STOP/Djvu ransomware, including the Uajs variant, spreads through similar channels, namely software cracks, unlicensed programs, and dubious internet tools. Specifically, it leverages single-use websites that offer trending items like new movies or software cracks. These sites are often pushed to the top of search results through spam techniques, host malicious links that deliver ransomware.

Uajs encrypted files
Uajs encrypted files

Initially, cybercriminals inject downloader malware that paves the way for the ransomware by disabling security defenses, such as Windows Defender, and implementing changes to hinder antivirus programs from blocking or removing the ransomware.

The Uajs Virus Encryption Process

Upon entry, the Uajs ransomware disables common backup methods and blocks access to potential recovery solutions. It then systematically encrypts files, connecting to its server for an encryption key before starting the encryption process, which it repeats until all target files are encrypted.

STOP/Djvu Ransomware actions scheme
STOP/Djvu Ransomware

To ensure persistence, Uajs ransomware clones its executable file into obscure directories, avoiding detection by most antivirus software.

Removing Uajs and Safeguarding Against Ransomware

Given its sophistication, detecting and removing ransomware demands the utmost care. The Uajs virus, known for hindering security software execution, requires you to bypass these restrictions for successful removal and system recovery.

Loaris Trojan Remover stands out as the premier choice for eradicating the ransomware threat and restoring your system. It boasts an advanced scanning engine that detects ransomware in all forms and allows for targeted scans with its Custom Scan feature.

To navigate around the ransomware’s execution blocks, boot your PC in Safe Mode with Networking. This can be done through the Troubleshooting panel by restarting your PC while holding the Shift key, navigating to Startup Settings, and selecting Windows 10 Safe Mode with Networking.

Reboot PC into Safe Mode
Reboot PC into Safe Mode

In Safe Mode, launch the Loaris installer, follow the installation prompts, and activate the free trial for full functionality.

Trojan Remover main screen
Trojan Remover Main Screen

Conduct a full scan, review the list of detected threats, and proceed with the recommended removal actions.

Loaris scan for Uajs virus
Scanning for Uajs virus

Decrypting Uajs Files

Decrypting files affected by Uajs ransomware might seem daunting, but not all hope is lost. The malware uses two key types – online and offline – with the latter offering a ray of hope for decryption.

Emsisoft’s free tool for STOP/Djvu decryption leverages collected keys to offer victims a chance at recovering their files.

Decryption with Emsisoft Decryptor for STOP Djvu

Install the Emsisoft Decryptor for STOP Djvu from the official website, set it up by specifying target folders, and initiate the decryption process.

Emsisoft Decryptor for STOP Djvu
File decryption process

If Emsisoft’s tool cannot decrypt your files, consider file recovery tools as an alternative. For example, PhotoRec, a free tool, can recover files deleted by ransomware by searching for residual data left on the disk.

Recovering .Uajs Files with PhotoRec

Download PhotoRec, specify the disk or partition and desired file formats for recovery and start the recovery process to salvage your encrypted data.

File Recovery for Uajs
Files Recovery

Frequently Asked Questions

🤔Can I decrypt the online key ID by myself?

Deciphering the online ID used by Uajs ransomware is currently beyond the reach of modern computing, potentially taking millions of years due to its complexity. The most effective alternative is employing file recovery tools, as detailed above.

🤔Can Loaris Trojan Remover decrypt files?

While Loaris Trojan Remover excels at eliminating Uajs ransomware and repairing the aftermath on your PC, it doesn’t decrypt files. For decryption attempts, please use the recommended tools.

🤔Are encrypted Uajs files a threat to my system?

This files remain as they were before encryption, except for the altered file header, which prevents your system from recognizing and reading them. They’re not infectious or harmful to your computer’s health. Keeping them on your system poses no security risk, allowing you to focus on recovery options without worry.

Leave a Comment