Severity scale:  

Remove .xtbl virus (Improved Guide) - Apr 2018 update

removal by Gabriel E. Hall - - | Type: Ransomware

XTBL virus – dangerous ransomware which returns as a part of Scarab ransomware

An illustration of the .xtbl virus ransomware

Questions about .xtbl virus

XTBL virus (otherwise known as the Troldesh Trojan) is ransomware that has been targeting all versions of Windows operating systems. Its aim is to lock down the most of personal victim's files using AES-265 and RSA[1] encryption algorithm. This crypto-malware changes these files by adding a line of random numbers that indicate victim’s ID and an email address pointing to the ransomware developer to their name. The ID numbers and emails  tend to be different, but the final part of this lengthy extension is always the same – .xtbl file extension.

Name XTBL virus
Also known as Scarab-XTBL
Type Ransomware
Danger level High. Can lead to permanent data loss
Cypher used AES-265 and RSA
File extension .xtbl
Associated emails,,,,,, 
Distribution Malicious attachments, hacked or compromised sites, illegal software repacks, etc.
Elimination Download and install Reimage Reimage Cleaner Intego

There are many different types of XTBL ransomware and the newest addition to this group of viruses is Scarab-XTBL. This version is an updated variant of Scarab Ransomware which appends the same extension as its predecessors – .xtbl. As soon as encryption process is complete, the virus generates a ransom note called “IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT” and places it into each directory which contains infected files.

Sadly, the changed extension is just the tip of the iceberg compared to the problems you will have to deal with if this virus ever hits your PC. XTBL virus is a ransomware-type program, so it uses the file encryption technique to extort money from its victims. In other words, it locks the files with a sophisticated algorithm which is virtually uncrackable, unless, of course, you have a private key.

Unfortunately, this key is stored on some remote, well-protected server. And, as you may already suspect, the cyber criminals are not willing to hand this key in that easily. In exchange, the hackers demand a considerable amount of money.

Remember that paying up is the last thing you should do, because you may easily get scammed and lose your money. The better choice is to remove .xtbl ransomware virus from the computer as soon as possible to avoid additional damage. Virus-fighting utilities such as Reimage Reimage Cleaner Intego can be used for this purpose.

When the .xtbl ransomware virus encrypts the data, it creates README.txt document on every folder containing corrupted data. Instead of your regular desktop screen, you will also see a note, encouraging you to read the README document.

In this file, the cyber criminals provide the user with an identification code and two different email addresses, to which this code has to be sent in order to recover the files. It is interesting that the notes are bilingual and feature the same information in Russian and English, respectively:

Ваши файлы были зашифрованы.
Чтобы расшифровать их, Вам необходимо отправить код:
[random numbers] на электронный адрес или
Далее вы получите все необходимые инструкции.
Попытки расшифровать самостоятельно не приведут ни к чему, кроме безвозвратной потери информации.

All the important files on your computer were encrypted.
To decrypt the files you should send the following code:
[random numbers] to e-mail address or
Then you will receive all necessary instructions.
All the attempts of decryption by yourself will result only in irrevocable loss of your data.

As you can tell, the criminals are not very elaborate about the financial part of data recovery. This only suggests that more details about the payment and its transfer are provided only after the victim contacts the criminals. Nevertheless, looking at general ransomware practices, it can be presumed that the sum demanded for the file recovery may vary from 0,5 to 4 BitCoints.

.xtbl crypto-virus

But as we have already mentioned, paying the cyber criminals may be possible but not the wisest way to retrieve your data. Therefore, we recommend XTBL virus removal instead using trusted security software like Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes. You may later try to restore your files using data recovery tools, such as PhotoRec , R-Studio or Kaspersky virus-fighting utilities. However, we do not recommend keeping your hopes very high.

Different variants of .xtbl ransomware Just like the is .xtbl ransomware, this virus sneaks into the computer’s system undetected and encrypts the containing files. Similarly to .xtbl, it will display a notification on the desktop, and more detailed information about the file recovery in the additional document creates on the encrypted folders. By the way, the name of the ransom note differs from the .xtbl, so instead of README.txt, you will see How to decrypt your files.txt. Despite the minor differences, this virus is just as dangerous as .xtbl, so you have to remove it from your computer without a delay. This version of the virus is also practically identical to It spreads through spam emails[2] and, once in the system, encrypts the files with a military grade algorithm. It also uses the same How to decrypt your files.txt document to inform the victim about the file encryption and encourages the users to contact the cyber criminals via email. Having this virus on your computer may negatively influence your system’s performance and pose a threat to your future files, so you have to remove from your computer as soon as you have the chance. Similarly to the .xtbl versions mentioned above, this virus enters the computer in deceptive ways, posing as a legitimate document or software update. In reality, as soon as this virus carrier settles on the computer, it starts scanning the system for files and encrypting data. None of your pictures, documents or archives are safe when this virus is around, so you have to get rid of immediately when you notice you cannot access your files anymore. This ransomware also encrypts data and invites the victim to contact authors of the virus via email. Therefore, it is still unknown how much money they ask in exchange for a decryption key. We assume that they might be ready for negotiations. If your computer is infected with this virus, you should not even consider paying the ransom because most likely cyber criminals are not going to send it to you. is another version of the family of .xtbl viruses, though it acts similarly to the previous versions. By locking the victim's files, the virus can manipulate the user into transferring money for decryption and making an easy profit out of it. What is new with this version is that it offers the user to decrypt one file of their choice as a type of insurance. Otherwise, the virus does not differ much from its predecessors and is just as dangerous and fraudulent.

Okean-1955 ransomware virus. This is yet another ransomware that belongs to .xtbl virus family. This malware encrypts victim's files, hides decryption key in its command and control server, and asks to purchase it. The virus does not state the exact price of the decryption key; therefore, the victim has to send an email to and ask what is the price. For this reason, this malicious program has another name – ransomware. If you have detected this infection on your computer, remove it without any hesitation!

Scarab-XTBL virus. The malware has been spotted by MalwareHunterTeam[3] in April 2018. It is a new variant of Scarab ransomware, which adds .xtbl appendinx to each of the files and remands ransom to be paid in Bitcoins via ransom note called “IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT.” The note looks identical to Scarab ransomware note and urges users to contact cybercrooks via

.xtbl malware.xtbl ransomware is a deadly threat that can lead to permanent deletion of files.

Ransomware is distributed mostly via spam emails

Ransomware viruses spread through spam emails mostly. It may appear as a legitimate file attachment at first, but in reality, there is a malicious script behind it. Usually, the virus spreads in JavaScript or Word format. If you accidentally download the first one, there is not much you can do to stop the virus as the JavaScript automatically activates the virus, and it starts its dirty work on your computer.

Word documents, on the other hand, may leave you some hope. This virus needs the Word macros script to activate itself, so if it is not enabled, the infection will not be able to spread. Although the virus may try to convince you to enable macros, you should not do that because this way, you will simply allow a malicious threat to enter your computer.

Therefore, security experts[4] urge users to be extremely careful when handling emails from unknown sources. If you see that the message have been flagged as spam – it is a high chance it is a malicious email. Thus, swiftly delete if from your inbox and never open attachments or click on provided links.

.xtbl virus can be removed using professional security software

What is especially unfortunate when talking about ransomware viruses is that they rarely leave the computers unharmed. Usually, the files remain locked and sometimes a full system overwrite needed to eliminate the consequences.

Unlike what most users think, .xtbl virus removal does not mean that the locked files will be decrypted. Nevertheless, it is crucial if you want to use your computer normally again. If some of the virus residue files are left on your PC, they may help the virus to bounce back to your computer or create system vulnerabilities allowing other malware to sneak in.

.xtbl virus

Therefore, to remove XTBL ransomware safely, you should employ the best security tools. What you should keep in mind, though, is that .xtbl malware may fight the antivirus and block its processes. In such a case, you can try completing the steps provided at the end of this article and running the scan again. However, if you are still experiencing any difficulties with the virus elimination, do not hesitate to contact us.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove .xtbl virus, follow these steps:

Remove .xtbl using Safe Mode with Networking

If .xtbl virus does not let you start your anti-malware software, reboot your PC in Safe Mode with Networking:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove .xtbl

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete .xtbl removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove .xtbl using System Restore

You can eliminate the virus by using System Restore:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of .xtbl. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that .xtbl removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove .xtbl from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

The biggest problem related to .xtbl ransomware is its capability to encrypt your files. If you are infected with this virus and think about paying the ransom in exchange for the xtbl decryptor, we must stop you. Beware that in most of the cases scammers fail to give users codes that they need. According to FBI, they have seen thousands of cases where people never got a key that is needed for the decryption of encrypted files.

If your files are encrypted by .xtbl, you can use several methods to restore them:

How to restore data encrypted by ransomware virus with the help of Data Recovery Pro?

We recommend Data Recovery Pro to restore encrypted files. It can recover a wide range of files stored on the hard drive and other locations.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by .xtbl ransomware;
  • Restore them.

How to recover files encrypted by .xtbl virus with the help of Windows Previous Versions feature?

If you need to decrypt only individual files, we recommend trying Windows Previous Versions feature. However, this method works only if the System Restore function was enabled before infiltration of ransomware.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

How to retrieve files blocked by ransomware with the help of ShadowExplorer?

Below you will find concise instructions on how to recover data using ShadowExplorer. Please note that this method may not be functional if the virus has already deleted the Volume Shadow Copies of your files. In case these system backups are still in place, follow the instructions below to try out the ShadowExplorer data recovery method.

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Decryptor is not available yet

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from .xtbl and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.

The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login. 

VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Gabriel E. Hall
Gabriel E. Hall - Passionate web researcher

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Gabriel E. Hall
About the company Esolutions

Removal guides in other languages

  1. Leoanrd says:
    June 2nd, 2016 at 9:03 am

    I got infected with this virus the other week! Good thing I didnt have anything very important on my PC. I was only worried about my bank account.. But I removed the virus and all seems good so far

  2. trinittyOlive says:
    June 2nd, 2016 at 9:04 am

    I was infected too! I wasnt that lucky though, I lost a good bunch of pictures… But i managed to recover some with Photorec…

  3. agostinho says:
    September 27th, 2016 at 5:36 am

    I was infected by this virus pleade help me how to remove it from my PC

  4. Marella says:
    June 3rd, 2016 at 9:32 am

    STOP! Not possible to decrypt?? how come??

  5. Josh17 says:
    June 3rd, 2016 at 9:33 am


  6. Lndn says:
    June 3rd, 2016 at 9:34 am

    Thanks God I had a backup. Now I seriously understand that backups are really useful.

  7. MrChui says:
    August 9th, 2016 at 4:39 pm

    I just visited a customer and found a new variant – me thinks. Since there is no “ransom note”, I suspect Baby Ransomware in place: Lots of files encrypted in the format: Any body seen that kind of ransomware?

  8. 2-Spyware team says:
    August 9th, 2016 at 11:10 pm

    Dear visitor,

    That is definitely one of .xtbl ransomware variants. It seems that no decryption tool is available for this version yet. Please regularly check the site – you can find out what kind of ransomware it is and see when a decryption tool gets released.

    Good luck!
    2-Spyware team

  9. Isfar says:
    October 8th, 2016 at 4:34 am

    Our Windows Server has been infected by ransomware variant “”
    Can you help??

  10. Festus says:
    February 22nd, 2017 at 9:26 am

    Solution! Solution!.
    Finally make it..

    I have solution to Xbtl infected file. 100% working decrypter.
    Talk to me on +254737911319

Your opinion regarding .xtbl virus