Xcbg Virus


7-day Free Trial w/Credit card, no charge upfront or if you cancel up to 2 days before expiration; Subscription price varies per region w/ auto renewal unless you timely cancel; notification before you are billed; 30-day money-back guarantee; Read full terms and more information about free remover.

*Xcbg is a variant of Stop/DJVU. Source of claim SH can remove it.

Xcbg is a malware program capable of causing your files to become inaccessible by using an encryption algorithm to lock them. The whole purpose of the lockdown Xcbg places on your files is to force you to pay a ransom for the private key that can reverse the encryption.

DJVU 1 1024x641
The Xcbg virus file ransom note

The main purpose of the article that you are about to read is to give you some essential details regarding a computer threat known as Xcbg so that you know how to avoid it and also what potential ways of dealing with it you might have in case it has already attacked your computer. The first important thing that we must mention with regards to the Xcbg virus is that this is a version of Ransomware. As you probably already know, malware programs of the Ransomware category are mainly used for money extortion and blackmailing harassment. The way those threats operate is they lock the screen of the infected device or encrypt the personal data files that are stored on it. Depending on which of the two elements is targeted, there are two main groups of Ransomware: screen-lockers and cryptoviruses.

The Xcbg virus

The Xcbg virus is a type of malware known as a Ransomware file-locking virus that will block all data on your computer, preventing you from accessing or using it. The Xcbg virus would display a ransom-demanding message on your screen soon after your files become locked.

Xcbg belongs to the latter group as it has been reported to target the files of the user and employ an advanced encryption algorithm in order to render them inaccessible. Upon the completion of the encryption, the insidious piece of malware generates a note on the desktop of the infected machine or inside the directory where the sealed data is. The not states that a ransom payment is demanded from the user or else the files would not get unlocked. If the malware victim pays the requested money, they’d supposedly receive a key from the hackers which should enable them to recover their blocked data. This is basically how most cryptovirus threats work and Xcbg Ransomware is no exception. In the next lines, you will learn more about what the exact reasons for those viruses being so problematic are and we will also give you some suggestion on what you could do in order to potentially deal with the threat without paying anything to the hackers behind it.

The Xcbg file

The Xcbg file is any file targeted and encrypted by this Ransomware that now has a changed extension and is unrecognizable by regular programs. To make the Xcbg file accessible again, you will need a special decryption key that the hackers offer to you in exchange for a ransom.

Xcbg File
The .xcbg file virus

This is a valid question and it must be said that in the end everyone decides for themselves if they should or shouldn’t pay the requested sum. However, we ought to tell you that going for the payment alternative could actually be a really bad idea. The hackers who control the virus promise that you will get the decryption key as long as you pay but you need to ask yourself if you could really trust those cyber criminals. Sure, in many cases such hackers do indeed keep their promise and provide their victims with the key but there are also a lot of examples where things haven’t really gone that way. There are many unfortunate users out there who have made the payment without getting anything in exchange for their money. Also, bear in mind that sending the sum would surely encourage those criminals to keep on harassing people through their Ransomware infections. Because of these reasons, we have made sure to offer our readers a possible alternative. We cannot guarantee that it would work in all cases but it’s still something that we advise you to try as it won’t cost you anything. If you are interested, go to our guide on this page and follow its steps in order to remove Xcbg and potentially get some of your data back using the suggested methods.

Ransomware encryption and preventing future infections

The method known as encryption is the key to the high success rate of most Ransomware viruses. First of all, there are very few and difficult to notice symptoms that this process would typically cause. RAM and CPU spikes are the most common indications of an encryption but, as we said, it could be difficult to spot that. Furthermore, even if you have a good and strong antivirus on your PC, the Xcbg, KqgsIiof or Vyia infection might still not get detected because the encryption would normally harm nothing on your PC and also none of your files would really get damaged by it. The third thing that’s worth nothing with regards to this process is that once it is completed, your data would stay locked even if you manage to get rid of the malware. That said, you’d still need to remove the virus before attempting any data restoration methods so that no more files would get locked by the threat.

All in all, it’s simply better to ensure that your computer doesn’t ever get infected by Xcbg or any other similar virus. To keep your system protected in future, remember to stay away from sketchy web content like suspicious and obscure adverts and offers, spam messages, questionable websites and also abstain from downloading software that might be pirated and illegally distributed. Last but not least, get your system equipped with a good antivirus program since it will help you stop Trojan infections as Trojans are also a frequently used tool for Ransomware distribution.


Detection Tool

anti-malware offerOFFER Read more details in the first ad on this page, EULA, Privacy Policy, and full terms for Free Remover.

*Xcbg is a variant of Stop/DJVU. Source of claim SH can remove it.

Remove Xcbg Ransomware


Restarting the computer in Safe Mode is described in detail in Step 1 of this guide. In order to remove the virus from your computer, we recommend that you begin by clicking on Safe Mode and completing the steps described in the link.

Please save this page to your browser’s preferred bookmarks, before you reboot the system, so you don’t have to search for Xcbg removal instructions every time you restart your computer.



*Xcbg is a variant of Stop/DJVU. Source of claim SH can remove it.

Xcbg ransomware is difficult to deal with since it can remain undetected for an extended period of time and do significant harm to the system.

When this ransomware infects your computer, one of the most difficult things you’ll have to do is find and terminate its malicious processes. Please read and carefully follow the directions in the following paragraphs if you are concerned about the safety of your computer.

Press CTRL+SHIFT+ESC on your computer’s keyboard at the same time. Focus your attention on looking for processes that might be related to the threat. The Processes tab in Windows Task Manager shows this information.

The next step is to scan the files associated with any questionable processes. You can do that by opening the fast menu when you right-click on the suspicious processes and then select Open File Location.


To save time, you can use the free online scanning tool provided below to confirm that the files connected with this process are clear of any potentially harmful code.

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Drag and Drop File Here To Scan
Drag and Drop File Here To Scan
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.

    You must first stop the processes associated with any of the files that have been marked as potentially harmful by right-clicking on it and choosing End Process. After that, remove the infected files from their original place.


    Additionally, you should deactivate any potentially hazardous startup items that Xcbg may have brought to your system without your awareness, after you’ve ended the malware-related processes. You can do this if you check the Startup tab in System Configuration.

    To access it, type msconfig in the Windows search field and press Enter.


    Once in the startup tab, the thing you should do is uncheck any items related with the malware. Also look for any other start-up elements not associated with the applications that launch when the system boots up. Unchecking their respective checkboxes will turn them off. Make sure you don’t disable any operating system or trusted software components while you’re doing this!


    *Xcbg is a variant of Stop/DJVU. Source of claim SH can remove it.

    Delete any dangerous registry entries found in your registry editor to ensure the ransomware is completely eliminated, and no hazardous components are left behind.

    If you type regedit in the Windows search box and hit Enter, the Registry Editor will open. Use the CTRL+F keyboard shortcut to find ransomware-related files in Registry Editor, and type the ransomware’s name in the Find box. After that, click on Find Next to begin the search. A harmful entry can be removed by right-clicking on it.

    Attention! Delete just the registry entries associated with ransomware. In order to avoid damaging your system and installed software, it is important to bear in mind that altering the registry or removing anything that is not directly connected to the danger is a bad idea. In case you need help with removing the ransomare-related entries, make sure to check out this page’s link to an anti-malware program that can help you get rid of the virus and other infections on your computer.

    Once you’ve finished with the Registry Editor, check the locations specified below for any other potentially harmful files or subfolders that could be lurking there. Simply type in their names in the Windows Search field and press Enter to open them one by one.

    1. %AppData%
    2. %LocalAppData%
    3. %ProgramData%
    4. %WinDir%
    5. %Temp%

    It’s a good idea to double-check any newly-added files or subfolders for anything suspicious. Everything in the Temp folder should be deleted from your computer to remove any possibly harmful temporary files.

    You’ll next want to inspect your computer for any harmful changes to the Hosts file. Hold down both the Windows key and the R key from the keyboard to open a Run dialog box, where you may enter the following command:

    notepad %windir%/system32/Drivers/etc/hosts

    We’d want to know if you see any strange IP addresses in “Localhost” as shown in the image below. Don’t hesitate to ask us anything in the comments section if you have any questions or concerns.

    hosts_opt (1)


    How to Decrypt Xcbg files

    Even for experts, dealing with the implications of ransomware data encryption may be a challenging task. Fortunately, there are some file-restoration tools that may allow you to decode encrypted data. First, however, you need to find out what variant of Ransomware you’re dealing with. To obtain this information, look at the end of the encrypted files and their file extensions. 

    New Djvu Ransomware

    STOP Djvu is a recently released Ransomware variant that is actively attacking users worldwide. You’ll be able to tell this particular danger apart from others thanks to the .Xcbg suffix that it attaches to the encrypted data.

    There is a way to retrieve data encrypted by this variant, if the ransomware is using an offline key for its encryption. A file-decryption tool is included below, and it may be downloaded by clicking on the link.



    Run the decryption tool that you’ve downloaded as an administrator, then select “Yes” to start it. Next, read the included instructions and the license agreement. The decryption process will begin when you press the Decrypt button. If you need to decode files encrypted using unknown offline keys or online encryption, please note that this tool may not be able to decode them. 

    Important! Before attempting to recover data that has been encrypted, carefully search your computer for any hidden ransomware-related files and harmful registry entries. We recommend that you use this page’s online virus scanner and the professional anti-virus software to remove any traces of malware that you find. If you have any questions or concerns, please free to post them in the comments area down below, so we can help you.


    About the author

    Brandon Skies

    Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.


    • Hi Brandon, I followed your instructions, I removed the virus, I still stayed on an external hard drive with the encrypted files (with online key). Is there any paid method for me to decrypt at least my family photos?
      PhotoRec, Recuva and Stellar software didn’t help.

      PS. Those who steal family memories and ask for $ 980, who does that? probably someone worse than a war criminal.

    Leave a Comment

    We are here to help! Use SpyHunter to remove malware in under 15 minutes.

    Not Your OS? Download for Windows® and Mac®.

    * See Free Trial offer details and alternative Free offer here.

    ** SpyHunter Pro receives additional removal definitions and manual fixes through its HelpDesk in cases where they are needed.

    Spyware Helpdesk 1