Eijy Virus

7-day Free Trial w/Credit card, no charge upfront or if you cancel up to 2 days before expiration; Subscription price varies per region w/ auto renewal unless you timely cancel; notification before you are billed; 30-day money-back guarantee; Read full terms and more information about free remover.

*Eijy is a variant of Stop/DJVU. Source of claim SH can remove it.


Eijy is a malicious program that encrypts the files on its victims’ computers. Eijy falls into the category of ransomware viruses.

This is among the most dangerous and arguably the most numerous category of malware out there. If you have been infected with this terrible virus, we recommend you stick around to learn more about it and see what you can do to take care of it on your own. 

The Eijy ransomware will leave a _readme.txt file with instructions

Below we’ve included a detailed removal guide, which will help you remove Eijy from your machine. This step is of vital importance, no matter what you decide to do regarding the recovery of your encrypted files afterward. Failing to do so may render any and all efforts to restore your files completely useless, because you will only end up with a bunch of encrypted data all over again.

Then, once you have successfully eliminated the virus from your computer, you can check out the tips we have on how you may be able to save your data. Please keep in mind, though, that when it comes to ransomware, everything is up in the air. Whether you choose to pay the hackers for a decryption key or explore other options, nobody can guarantee that you will in fact be able to recover your files. This is what makes this particular category of malware so dangerous and so devastating to businesses and private persons alike.

The Eijy virus

The Eijy virus is a terrible culprit to have to deal with as it uses complex encryption to lock users out of their data. Even experienced cyber security specialists may struggle to deal with variants like the Eijy virus.

However, there are possibilities out there to actually retrieve the files that it has encrypted. For instance – and there are instructions on this in our guide – you can attempt to use system backups to obtain copies of the data.

Eijy virus
The Eijy virus will encrypt your files

In addition, there are ransomware decryptor tools that periodically surface online whenever there’s been some exceptionally devastating ransomware attack. These are tools developed to offer a free solution to ransomware attacks such as Bbii, Bbzz, Eijy, so you might have some luck trying there. Alternatively, if you have copies of your most important files stored on a different hard drive or a cloud service, then that solves your problem immediately.

The .Eijy file distribution

The .Eijy file distribution normally takes place with the help of other malware, such as a Trojan horse. The Trojan downloads the .Eijy file onto your computer and thus secures ‘free passage’ for it.

As for the Trojan, which acts as what’s known as a backdoor, it can come from a variety of sources.

Most commonly users get infected when they open a spam email (or more specifically, any attachments or links in them). But you are equally likely to land contamination like this by downloading cracked software from torrent sites or similar platforms, for example. All in all, practicing safe and mindful browsing habits greatly increases your chances of preventing such infections. And keeping backups of your most valuable files elsewhere will surely nullify the effects of another potential ransomware infection.


Danger LevelHigh (Ransomware is by far the worst threat you can encounter)
Data Recovery ToolNot Available
Detection Tool

*Eijy is a variant of Stop/DJVU. Source of claim SH can remove it.

Remove Eijy Ransomware


You should carefully follow the directions in this removal guide if you want to successfully remove the Eijy ransomware from your computer. As a start, turn off your computer’s Internet connection to prevent the dangerous malware from connecting with its servers. The infected system’s external storage and USB devices should also be disconnected.

You may then follow the on-screen directions to restart your computer in Safe Mode by clicking on this link and following the steps explained there. After the reboot, return to this page to complete the next step. In order to get back to this page fast after the reboot, you can save it as a bookmark in your browser.



*Eijy is a variant of Stop/DJVU. Source of claim SH can remove it.

Open Task Manager by entering “task manager” in the Windows search area and clicking Enter. From there, choose the Processes tab and then sort the running processes by their memory and CPU use. It is necessary to scan the files associated with any processes that could be hazardous. To access these file, right-click on the suspicious process and select Open File Location from the context menu.


Run a scan by dragging and dropping the contents of the folder into the scanner that we have provided below:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Drag and Drop File Here To Scan
Drag and Drop File Here To Scan
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.

    If the scanner identifies hazardous files on your computer, first, right-click the process and choose “End Process“. Removing files from their file location should be the next step before moving on with the instructions from this guide.


    Next, open the Run window by pressing Windows key + R at the same time, and then type the following command and hit Enter.

    notepad %windir%/system32/Drivers/etc/hosts

    On your computer, make sure that you have the Hosts files opened in a separate window or tab. It’s a good idea to report any strange IP addresses identified under the “Localhost” section of the text in the comments below. We’ll look into the IP addresses you share in the comments and let you know if any of them pose a threat to your computer.

    hosts_opt (1)

    Some files relating to Eijy may appear in the System Configuration settings. The System Configuration window may be opened by typing “msconfig” in Windows’ search field and pressing the Enter key. Click on the “startup” tab to check if there are any malicious entries that are set to start when the system starts.

    If the startup items are connected to the malicious software that has to be deleted from your computer, uncheck the boxes next to them. If you have any reservations about a startup item, check the internet for further information before unchecking it and making any changes.




    What makes ransomware a very dangerous threat is that this type of malware may remain undetected in the system’s registry by quietly installing new harmful files. That’s why, a thorough registry search is highly recommended in order to identify any malicious files. For those of you who don’t know how to access the Registry Editor,  go to the Windows search field, type “Regedit” in and then hit Enter from the keyboard.

    Using the CTRL and F keys on your computer, you may search the Registry Editor for files that have been infected and then remove them. To begin your search, type the ransomware’s name in the Find box and then press the Find Next button.

    Attention! To successfully delete ransomware-related registry files, you may need to have some general computer knowledge and experience. If legitimate registry entries are deleted instead of the malicious ones, the system may become unstable and even crash. So, if you don’t believe you can remove the infection on your own, a virus removal program like the one on our website is highly recommended.

    The following locations on a computer may also contain files associated with the ransomware. Using the Windows search window, enter the following search phrases and then hit Enter:

    1. %AppData%
    2. %LocalAppData%
    3. %ProgramData%
    4. %WinDir%
    5. %Temp%

    Once you open each of the locations, carefully search it for files and folders with random names. Don’t make any changes or deletions unless you are sure these files and folders are linked to the infection. When you open Temp, you may want to remove all the files that are stored there. These are temporary files, some of which may be related to the infection.


    How to Decrypt Eijy files

    A Ransomware infection may be hard to deal with even in the hands of the most skilled professionals.  That’s why, users who are unfamiliar with the various file-decryption methods would have a tough time dealing with a threat like Eijy. The first thing that is important to do is to figure out which variant of ransomware has infected your machine. This information may be discovered by looking at the file extensions of the encrypted files.

    Before beginning any data recovery technique, however, it is essential to properly check the machine for hidden malware because any data you try to decrypt while the ransomware is still on your machine may be encrypted again. In such cases, using professional anti-malware software that can detect the hidden danger might be a lifesaver.

    New Djvu Ransomware

    STOP Djvu is a ransomware variant that a lot of web users are being faced with recently. The .Eijy file extension is usually associated with files that have been encrypted by this particular variant of ransomware. The good news is that people who have verified that their computer system is clear of malware may benefit from using decryption software like the one found at the following website and try to recover some of their files.


    File decryption should always be preceded by a careful read of the license agreement and any additional instructions included with the decryptor tool. Keep in mind that this program may not be able to decrypt your files if they were encrypted with an unknown offline key or online encryption.

    To eliminate Eijy, you may need to utilize anti-virus software if the manual removal guide provided on this page isn’t enough to do so. If you are concerned about a particular file, you may run a manual scan on it using our free online virus scanner. If you have any questions or concerns about this guide’s removal instructions, please post them in the comment area below.



    About the author


    Violet George

    Violet is an active writer with a passion for all things cyber security. She enjoys helping victims of computer virus infections remove them and successfully deal with the aftermath of the attacks. But most importantly, Violet makes it her priority to spend time educating people on privacy issues and maintaining the safety of their computers. It is her firm belief that by spreading this information, she can empower web users to effectively protect their personal data and their devices from hackers and cybercriminals.

    Leave a Comment

    We are here to help! Use SpyHunter to remove malware in under 15 minutes.

    Not Your OS? Download for Windows® and Mac®.

    * See Free Trial offer details and alternative Free offer here.

    ** SpyHunter Pro receives additional removal definitions and manual fixes through its HelpDesk in cases where they are needed.

    Spyware Helpdesk 1