Delete Uajs ransomware

Delete Uajs ransomware

Uajs ransomware is part of the Djvu/STOP ransomware family. It’s a serious file-encrypting malware infection that targets personal files. Once files are encrypted, it may not be possible to get them back.



Uajs ransomware will start encrypting files immediately upon being initiated. Its main targets are personal files, including photos, videos, and documents. Once encrypted, the files will have a .uajs extension added to them. For example, a 1.txt file would become 1.txt.uajs if encrypted. Unfortunately, files with that extension will not be openable unless they’re first decrypted with a specific tool.

The ransomware drops a _readme.txt ransom note when it’s done encrypting files. The note explains that to acquire a decryptor, users would need to pay $999 in Bitcoin. According to the note, there’s a 50% discount for users who make contact with the cybercriminals within the first 72 hours. Furthermore, users can send one file to be decrypted for free as long as it does not contain any important information.

While paying the ransom may seem like a good idea for users with no other option, it’s not recommended. Unfortunately, cybercriminals do not feel obligated to help victims get their files back and just take their money. It has happened many times in the past to many victims.

Below is the full Uajs ransomware _readme.txt ransom note:


Don’t worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
Do not ask assistants from youtube and recovery data sites for help in recovering your data.
They can use your free decryption quota and scam you.
Our contact is emails in this text document only.
You can get and look video overview decrypt tool:

Price of private key and decrypt software is $999.
Discount 50% available if you contact us first 72 hours, that’s price for you is $499.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.

To get this software you need write on our e-mail:

Reserve e-mail address to contact us:

Your personal ID:

If users have a backup, they can connect to it and start file recovery as soon as they remove Uajs ransomware from their computers. It’s a serious and complex infection, and the use of anti-malware software is recommended. Otherwise, users could end up causing additional damage. When the ransomware no longer comes up in scans, it’s safe to connect to a backup.

Unfortunately, backup is the only way to recover files for free. There currently is no free Uajs ransomware decryptor available, and it’s unlikely to be released in the near future. If it does get released, it will be downloadable from NoMoreRansom. It’s worth mentioning that users should be very careful when looking for free decryptors because there are many fake ones.

How is Uajs ransomware distributed?

Uajs ransomware, like most ransomware, is often distributed via email attachments and torrents. Users with good browsing habits are significantly less likely to come across malware because they don’t engage in risky behavior. If users open email attachments without double-checking first and use torrents to pirate copyrighted content, developing better habits would decrease their chances of encountering malware. Becoming familiar with the most common malware distribution methods is also recommended.

It’s common to find malware in torrents, especially in ones for popular entertainment content (e.g. movies, TV series, video games, etc.). Torrent sites are often poorly moderated, which leads to an influx of malicious torrents. For users not familiar with what malware in a torrent looks like, it would be easy to pick up an infection. Using torrents to pirate is not only content theft but also dangerous for users’ data.

Another common way users pick up malware is by opening email attachments. Malicious actors launch massive malspam campaigns using emails that resemble parcel delivery notices or order confirmations. They come with attached files, which if opened, would lead to an infection. Fortunately, these emails are often easy to recognize. Despite senders claiming to be from legitimate companies whose services users use, the emails are full of grammar/spelling mistakes. Obvious mistakes immediately give away a malicious email because you would normally not see them in legitimate emails since they look unprofessional. Furthermore, the emails address users using generic words like User, Member, Customer, etc. Generally, when a legitimate company emails customers, it addresses them using their names. However, because malicious actors target many users with the same email, they use generic words.


In some cases, malicious emails can be significantly more sophisticated. This is especially the case when malicious actors target a specific person. Thus, is recommended to always scan unsolicited email attachments with anti-virus software or VirusTotal before opening them.

How to remove Uajs ransomware

If users have a backup of files, they should not connect to it until they remove Uajs ransomware from the computer. If ransomware is present when users connect to backup, backed-up files will become encrypted. To delete Uajs ransomware, users should use a good anti-malware program. It’s a complex infection that requires a professional program. If users try to remove Uajs ransomware manually, they could end up causing additional damage to their devices.

Unfortunately, waiting for a free Uajs ransomware decryptor to be released is the only option for users with no backup. However, whether a free Uajs ransomware decryptor will be released is uncertain. Malware researchers help as often as they can with free decryptors but it’s not always possible. If a free Uajs ransomware decryptor does get released, it will be available on NoMoreRansom.

Uajs ransomware is detected as:

  • Win32:PWSX-gen [Trj] by AVG/Avast
  • Trojan.MalPack.GS by Malwarebytes
  • Trojan:Win32/StealC.MAC!MTB by Microsoft
  • Ransom.Win32.STOP.YXEDCZ by TrendMicro
  • Trojan.Generic.35616058 by BitDefender
  • A Variant Of Win32/Kryptik.HWTK by ESET
  • HEUR:Trojan-Ransom.Win32.Stop.pef by Kaspersky
  • Artemis!79B50EE54735 by McAfee

Site Disclaimer is not sponsored, affiliated, linked to or owned by malware developers or distributors that are referred to in this article. The article does NOT endorse or promote malicious programs. The intention behind it is to present useful information that will help users to detect and eliminate malware from their computer by using WiperSoft and/or the manual removal guide.

The article should only be used for educational purposes. If you follow the instructions provided in the article, you agree to be bound by this disclaimer. We do not guarantee that the article will aid you in completely removing the malware from your PC. Malicious programs are constantly developing, which is why it is not always easy or possible to clean the computer by using only the manual removal guide.

Leave a comment

Your email address will not be published.