Home » Cybersecurity » How to remove XData ransomware (Virus Removal)
XData ransomware

How to remove XData ransomware (Virus Removal)

XData ransomware uses AES encryption algorithm, appends the .~xdata~ extension to files it encrypts

XData is new ransomware that is spreading very fast globally; literally putting WanaCry ransomware in after thoughts. XData ransomware uses AES encryption algorithm to encrypt files and appends the extension .~xdata~ to each file. A file named test.png becomes test.png.~xdata~.

XData ransomware

The ransomware does not use an interface( or UI) like other ransomware to lock screens and restrict access to the machine. Instead, XData ransomware will display a note file named HOW_CAN_I_DECRYPT_MY_FILES.txt that explains what happens and how to purcahse a private key and special tool to decrypt files the way the malware authors want victims to.

~xdata~ files

The ransom note explains that in order to obtain a private key and special tool you must find their PC key file with ‘.key.~xdata`’ extension in a certain location. The note further explains that the key must be sent to one of the email addresses listed on the ransom note.

Your IMPORTANT FILES WERE ENCRYPTED on this computer: documents, databases, photos, videos, etc.

Encryption was prodused using unique public key for this computer.
To decrypt files, you need to obtain private key and special tool.

To retrieve the private key and tool find your pc key file with ‘.key.~xdata~’ extension.
Depending on your operation system version and personal settings, you can find it in:
‘C:/Documents and Settings/All Users/Application Data’,
‘Your Desktop’
folders (eg. ‘C:/PC-TTT54M#45CD.key.~xdata~’).

Then send it to one of following email addresses:


Your ID: [NAME]#[ID]

Do not worry if you did not find key file, anyway contact for support.

The XData virus is very popular and is spreading very fast throughout Ukraine, Russia, and other European and American countries (North and South).  In the past hours it has been one of the most active malware campaigns, second to Cerber and taking all headlines from the recent attack orchestrated by WanaCry ransomware which is suspected to have ties with North Korean hackers.

The ransomware is suspected to use a trojan to drop an exploit on the computer it infects. The most recent variants of similar ransomware have been distributed via a specific region and that is suspected here as well. Once the ransomware infects the targeted computer it creates a random folder in C:\ProgramData. The folder created by the ransomware contains executable files named mssql.exe, msdns.exe, mscomrpc.exe,  and msdcom.exe.

The instructions on this page will help you remove XData ransomware, viruses, malware, and decrypt encrypted files with the ~xdata~ extension. Follow each step below to remove this infection and secure your computer from malicious threats. On the bottom of this guide you will also find recovery and decryption software for various ransomware infections.

1. Remove XData with Malwarebytes


  1. Open your browser window and download Malwarebytes 3.0 Premium or Malwarebytes Anti-Malware Free.
  2. Open the executable file (mb3-setup.exe) to begin installing Malwarebytes.
  3. Select your language, click Next, then select “I accept the agreement,” click the Next button several times, and then click the Install button to install Malwarebytes. Click Finish once the install process is complete.
  4. Open Malwarebytes and click the Scan Now button on the Dashboard to begin scanning your computer.
  5. Click the Quarantine Selected button once the scan is finished.
  6. If Malwarebytes says “All selected items have been removed successfully. A log file has been saved to the logs folder. Your computer needs to be restarted to complete the removal process. Would you like to restart now?” click the Yes button to restart your computer.

2. Remove trace files with HitmanPro


  1. Open your browser window and download HitmanPro.
  2. Open the executable file (hitmanpro_x64.exe or hitmanpro_x32.exe) to begin installing HitmanPro.
  3. Click the Next button, check “I accept the terms of the license agreement,” and click the Next button again.
  4. On the Setup page select “Yes, create a copy of HitmanPro so I can regularly scan this computer (recommended)” and add your email address to the registration fields to begin the free trial.
  5. Click Next to begin scanning your computer.
  6. Once the Scan results are displayed click the Next button and click the Next button again on the Removal results page.

3. Clean up and repair issues with CCleaner


  1. Open your browser window and download CCleaner Professional or CCleaner Free.
  2. Open the executable file (ccsetup.exe or other) to begin installing CCleaner.
  3. Click the Install button to begin stalling the program.
  4. Click Run CCleaner to open the program when installation is complete.
  5. Select the Cleaner tab and click the Analyze button.
  6. When the Analyze process is complete click the Run Cleaner button to clean all files.
  7. Next, select the Registry tab and click the Scan for Issues button to scan for issues in your registry.
  8. When the scan is complete click the Fix selected Issues button and Fix All Selected Issues button to fix the issues.
  9. Next, select the Tools tab and click Startup. Examine each area, search for suspicious entries, and delete any suspicious startup entries by selecting the entry and clicking the Delete button.
  10. Next, click Browser Plugins and search each internet browser for unwanted browser add-ons and extensions. Click the extension you want to delete and click the Delete button to remove it.

Decryption Software

Shadow Explorer Restores lost or damaged files from Shadow Copies Download (Free)
Photorec Recovers lost files Download (Free)
Recuva Recovers lost files Download (Free) | Buy

Sean Moran

Sean Moran is a distinguished tech author and entrepreneur with over 20 years of extensive experience in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. His expertise and contributions to the industry have been recognized in numerous esteemed publications. Sean is widely acclaimed for his sharp intellect and innovative insights, solidifying his reputation as a leading figure in the tech community. His work not only advances the field but also helps businesses and individuals navigate the complexities of the digital world.

More Reading

Post navigation

Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

How to remove Locky decrypter (Virus Removal Guide)

How to remove Microsoft(C) Register Server (Virus Removal Guide)

How to remove FBI virus (Ransomware Removal Guide)