Remove DirtyDecrypt (Revoyem) Ransomware and Restore Your Files - How to, Technology and PC Security Forum |

Remove DirtyDecrypt (Revoyem) Ransomware and Restore Your Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

dirtydecrypt-ransomware-sensorstechforumInitially identified in July 2013, DirtyDecrypt Ransomware has been yet again revived. Researchers report that the crypto virus has spread on over 15 countries over the world with a high detection rate since its discovery. Also known as Revoyem, this ransomware chooses for its victims primarily PCs which are based in Europe and also in the United States of America. Despite this, we cannot guarantee that these cyber-attacks will not replicate to various other places as well. Given that ransomware attacks have “boom-ed” lately and the millions lost by users, it is strongly advisable to have relevant protection. In case you have been infected by DirtyDecrypt aka Revoyem, we strongly recommend reading the below-mentioned article to help you effectively deal with this threat and try to restore the files encoded by this virus.

Threat Summary



TypeRansomware Virus
Short DescriptionDirtyDecrypt encrypts the victim’s files and asks for payment.
SymptomsDirtyDecrypt Ransomware locks the user’s PC and his files cannot be reached.
Distribution MethodVia exploit kits and visiting adult content websites.
Detection Tool See If Your System Has Been Affected by DirtyDecrypt


Malware Removal Tool

User ExperienceJoin our forum to Discuss DirtyDecrypt Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Does DirtyDecrypt Replicate

To have a successful infection, DirtyDecrypt’s latest versions have been reported to take advantage of malicious .JS (JavaScript) files which have been uploaded on porn websites.

Another method of spreading the DirtyDecrypt is characterized by one common element – the usage of the Styx Exploit Kit. Such EK attacks may be common when massive spam e-mail campaigns are conducted. Lately, we have seen a tendency with old crypto viruses like DirtyDecrypt to conduct new spam campaigns and start re-infecting user PCs.

More Information About DirtyDecrypt (Revoyem) Ransomware

After research regarding this cyber-threat has been conducted by Symantec experts, they have established that computers which have been affected by DirtyDecrypt Ransomware have had the following OS’s installed on them:

  • Windows 2000
  • Windows NT
  • Windows XP
  • Windows Vista
  • Windows 7

After DirtyDecrypt Ransomware has been activated via one way or another, it may create malicious files that have random names in several Windows directories:

C:\ProgramFiles\Adobe\{random numbers and letters}.exe
C:\Users\{user profile}\AppData\Local\Temp\{random numbers and letters}.exe
C:\Users\{user profile}\AppData\Local\{random numbers and letters}.exe

Furthermore, DirtyDecrypt Ransomware starts blocking access to the computer by locking its screen and displaying an image to alert the user that his files are encoded. The image is named “DIRTY ALERT” and its message may look like the following:

“Files are encrypted
This file can be decrypted using the program DirtyDecrypt.exe
Press CTRL+ALT+D to run DirtyDecrypt.exe
If DirtyDecrypt.exe is not opened сheck the paths:
C:\Program Files\Dirty\DirtyDecrypt.exe
C:\Documents and Settings\{user profile}\Local Settings\Application Data\Dirty\DirtyDecrypt.exe
C:\Program Files (x86)\Dirty\DirtyDecrypt.exe
C:\Users\{user profile}\AppData\Roaming\Dirty\DirtyDecrypt.exe
C:\Documents and Settings\{user profile}\Application Data\Dirty\DirtyDecrypt.exe”

The cyber-criminals behind DirtyDecrypt do not mess around, and they have even provided the locations of the decryptor in case the victim experiences further difficulties. The cyber-crooks may use untraceable online payment methods, such as Ukash, PaySafeCard, MoneyPak and others to conduct the payoff while being undetected.

If you have decided to pay the ransom asked by DirtyDecrypt’s cyber-crooks, do not. There are several obvious reasons for that:

  • You help the cyber-criminals to further replicate DirtyDecrypt Ransomware.
  • You may not get back the access to your files.

We would also like to provide a reminder that the most efficient way to secure yourself against file-encryption by DirtyDecrypt is to back them up frequently. For more information about how to protect yourself against DirtyDecrypt, you can check the related article below:

Related Article: Safely Store Your Important Files and Protect Them from Malware

Regarding the file-encryption process of DirtyDecrypt ransomware, it scans primarily for files with the following file extensions:

7z, avi, doc, docm, docx, jpeg, jpg, mpeg, mpg, pdf, png, rar, rtf, wmv, xls, xlsm, xlsx, zip

The encrypted files by DirtyDecrypt can no longer be opened because their code has been scrambled with an advanced encryption algorithm, which may contain one or more ciphers from the RSA, AES, XOR and other types.

DirtyDecrypt Ransomware – Remove It and Restore Encoded Files

To completely delete DirtyDecrypt(Revoyem) Ransomware virus, you should isolate the threat before removing it. To do this, we advise you to carefully follow the removal instructions below and boot your computer in Safe Mode. From there, you may want to go over and take a look at the Manual and Automatic options for removal below. In case DirtyDecrypt modifies various registry entries and creates additional files, experts strongly advise using an advanced anti-malware program to automatically remove the virus in safe mode without damaging your computer.

In case you want to restore files encoded by DirtyDecrypt Ransomware, we strongly suggest that you take advantage of the alternative solutions for file restoration which we have provided below. They are not 100 percent guarantee you will get your files back, but they are the best alternative solutions you can get to until a decryptor has been released for free in public. When such software is released, make sure to follow this article – we will update it with a download URL for the decryptor.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share