.REVOLUTION Files Ransomware – Remove Virus and Restore Data
THREAT REMOVAL

.REVOLUTION Files Ransomware – Remove Virus and Restore Data

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by .REVOLUTION Ransomware and other threats.
Threats such as .REVOLUTION Ransomware may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This blog post has been created to show you how you can remove the .revolution extension ransomware and restore files that have been encrypted by it.

New ransomware has been detected by malware researcher Michael Gillespie (@demonslay335) which is very similar to the Xorist virus family but is not such. The virus has the objective to encrypt the files on your computer making them non-accessible to you, and it adds the .REVOLUTION file extension to them. Then, the virus drops a ransom note as an InfoFiles.txt which has the only purpose to notify the victims that they must pay for a decryption key after contacting the cyber-criminals via e-mail to [email protected]. If your PC has been attacked by this ransomware virus, we recommend that you read this article thoroughly and learn how to remove it and restore files that have been encrypted by it on your computer.

Threat Summary

Name.REVOLUTION Ransomware
TypeRansomware, Cryptovirus
Short DescriptionA file-encryption type of malware. Aims to extort the victims for their important files.
SymptomsEncrypts the files adding the .REVOLUTION file extension after their own one. Drops ransom note, named InfoFiles.txt
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .REVOLUTION Ransomware

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .REVOLUTION Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.REVOLUTION Ransomware Distribution Methods

The creators of the Xorist-like ransomware virus have used various tools to help them spread this ransomware infection to infect as many users as possible. They may upload the malicious files of .revolution file ransomware on torrent sites or suspicious software download sites, making them appear as if they were legitimate types of files, like software setups, game cracks, patches and others.

The primary method of spreading the .revolution file virus, however, may be via e-mails that resemble legitimate messages which claim to have an important attachment on them. One example of such e-mails may be seen below:

Besides invoices, receipts, the cyber-criminals may also use suspicious banking activity reports, just to get you to open the malicious attachment. The attachment may be uploaded to a Dropbox or other file-sharing site online or may be uploaded directly In the e-mail as an archive. It may contain the following files in it:

→ .exe .bat .vbs .wsf .js .hta .htm

Some e-mails may even have Microsoft Word documents that could contain malicious macros in them, meaning that after you open the document, it asks you to enable its content to read it and that is the moment when the script infects your computer with .revolution file ransomware.

.REVOLUTION Ransomware – Activity

As soon as it infects your computer system, the .revolution files virus may connect to a remote host and from it download it’s malicious files. The malicious files may be of different types and most likely reside in the following Windows locations:

  • %AppData%
  • %Roaming%
  • %Local%
  • %LocalLow%
  • %Temp%

After the files are dropped on the computer, the ransomware automatically executes them. Each file may have a different purpose. One of them may be a batch file (.bat) which could be executed as an administrator in the background without you noticing it. The file may run commands as an administrator in Windows. These commands may delete the shadow volume copies on the infected computer and may look somewhat like the following:

In addition to the files dropped is the ransom note of the .revolution ransomware, named InfoFiles.txt. It has the following message to victims:

All your important files were encrypted on this PC.
All files with .revolution extension are encrypted.
Encryption was produced using unique private key RSA-1024 generated for this computer.
To decrypt your files, you need to obtain private key + decrypt software.
The single copy of the private key, with will allow you to decrypt the files, is locate on a secret server on the internet.
To retrieve the private key, you need to contact us by email [email protected] send us an email your InfoFiles.txt file and wait for further instructions.
For you to be sure, that we can decrypt your files – you can send us a 1-2 not very big encrypted files and we will send you back it in a decrypted form free.
To send files you can use http://dropmefiles.com/
Do not waste your time! After 72 hours the main server will double your price!
Your personal id:
[redacted] E-mail address to contact us:
[email protected]
Reserve email address to contact us:
[email protected]

Other files dropped may be programmed with functions within them that may create registry entries (value strings) in the following Windows sub-keys, that run a program automatically on Windows start-up:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

  • Your operating system version.
  • The IP address.
  • Location and language information.
  • MAC address.
  • Networking information.
  • .REVOLUTION File Virus – Encryption Process

    The .REVOLUTION ransomware claims to use RSA-1024 encryption in order to make the files unable to be accessed again. The files targeted by this ransomware infection are often used types of files. But .revolution file virus is also careful to skip encrypting files in the system folders of Windows so that it is possible for the victim to still use the computer. The files targeted for encryption may have the following file extensions embedded to them:

    → “PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG” Source:fileinfo.com

    After the encryption has completed, the ransomware virus adds the .revolution file suffix to the files, making them look like the following:

    Remove Revolution Ransomware and Restore .revolution Encrypted Files

    To fully remove this ransomware virus, it is strongly advisable to focus on following the instructions for removal below. Since manual instructions cannot guarantee that you will fully remove .revolution file virus, automatic removal is always recommended. The best way to remove .revolution ransomware automatically according to security experts is using an anti-malware software which will delete all objects associated with this virus and make sure your computer is protected in the future as well.

    If you want to restore files, encrypted with the .revolution file extension, it is recommended to try out the methods in step “2. Restore files encrypted by .REVOLUTION Ransomware” below. They are in no way 100% effective for restoring all your files but may help recover most of your important files after all.

    Note! Your computer system may be affected by .REVOLUTION Ransomware and other threats.
    Scan Your PC with SpyHunter
    SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as .REVOLUTION Ransomware.
    Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

    To remove .REVOLUTION Ransomware follow these steps:

    1. Boot Your PC In Safe Mode to isolate and remove .REVOLUTION Ransomware files and objects
    2. Find files created by .REVOLUTION Ransomware on your PC

    Use SpyHunter to scan for malware and unwanted programs

    3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
    4. Try to Restore files encrypted by .REVOLUTION Ransomware

    Ventsislav Krastev

    Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

    More Posts - Website

    Leave a Comment

    Your email address will not be published. Required fields are marked *

    Time limit is exhausted. Please reload CAPTCHA.

    Share on Facebook Share
    Loading...
    Share on Twitter Tweet
    Loading...
    Share on Google Plus Share
    Loading...
    Share on Linkedin Share
    Loading...
    Share on Digg Share
    Share on Reddit Share
    Loading...
    Share on Stumbleupon Share
    Loading...