.REVOLUTION Files Ransomware – Remove Virus and Restore Data

.REVOLUTION Files Ransomware – Remove Virus and Restore Data

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This blog post has been created to show you how you can remove the .revolution extension ransomware and restore files that have been encrypted by it.

New ransomware has been detected by malware researcher Michael Gillespie (@demonslay335) which is very similar to the Xorist virus family but is not such. The virus has the objective to encrypt the files on your computer making them non-accessible to you, and it adds the .REVOLUTION file extension to them. Then, the virus drops a ransom note as an InfoFiles.txt which has the only purpose to notify the victims that they must pay for a decryption key after contacting the cyber-criminals via e-mail to “getyourfilles@bigmir.net”. If your PC has been attacked by this ransomware virus, we recommend that you read this article thoroughly and learn how to remove it and restore files that have been encrypted by it on your computer.

Threat Summary

Name.REVOLUTION Ransomware
TypeRansomware, Cryptovirus
Short DescriptionA file-encryption type of malware. Aims to extort the victims for their important files.
SymptomsEncrypts the files adding the .REVOLUTION file extension after their own one. Drops ransom note, named InfoFiles.txt
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .REVOLUTION Ransomware


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .REVOLUTION Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.REVOLUTION Ransomware Distribution Methods

The creators of the Xorist-like ransomware virus have used various tools to help them spread this ransomware infection to infect as many users as possible. They may upload the malicious files of .revolution file ransomware on torrent sites or suspicious software download sites, making them appear as if they were legitimate types of files, like software setups, game cracks, patches and others.

The primary method of spreading the .revolution file virus, however, may be via e-mails that resemble legitimate messages which claim to have an important attachment on them. One example of such e-mails may be seen below:

Besides invoices, receipts, the cyber-criminals may also use suspicious banking activity reports, just to get you to open the malicious attachment. The attachment may be uploaded to a Dropbox or other file-sharing site online or may be uploaded directly In the e-mail as an archive. It may contain the following files in it:

→ .exe .bat .vbs .wsf .js .hta .htm

Some e-mails may even have Microsoft Word documents that could contain malicious macros in them, meaning that after you open the document, it asks you to enable its content to read it and that is the moment when the script infects your computer with .revolution file ransomware.

.REVOLUTION Ransomware – Activity

As soon as it infects your computer system, the .revolution files virus may connect to a remote host and from it download it’s malicious files. The malicious files may be of different types and most likely reside in the following Windows locations:

  • %AppData%
  • %Roaming%
  • %Local%
  • %LocalLow%
  • %Temp%

After the files are dropped on the computer, the ransomware automatically executes them. Each file may have a different purpose. One of them may be a batch file (.bat) which could be executed as an administrator in the background without you noticing it. The file may run commands as an administrator in Windows. These commands may delete the shadow volume copies on the infected computer and may look somewhat like the following:

In addition to the files dropped is the ransom note of the .revolution ransomware, named InfoFiles.txt. It has the following message to victims:

All your important files were encrypted on this PC.
All files with .revolution extension are encrypted.
Encryption was produced using unique private key RSA-1024 generated for this computer.
To decrypt your files, you need to obtain private key + decrypt software.
The single copy of the private key, with will allow you to decrypt the files, is locate on a secret server on the internet.
To retrieve the private key, you need to contact us by email getyourfilles@bigmir.net send us an email your InfoFiles.txt file and wait for further instructions.
For you to be sure, that we can decrypt your files – you can send us a 1-2 not very big encrypted files and we will send you back it in a decrypted form free.
To send files you can use http://dropmefiles.com/
Do not waste your time! After 72 hours the main server will double your price!
Your personal id:
[redacted] E-mail address to contact us:
Reserve email address to contact us:

Other files dropped may be programmed with functions within them that may create registry entries (value strings) in the following Windows sub-keys, that run a program automatically on Windows start-up:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  • Your operating system version.
  • The IP address.
  • Location and language information.
  • MAC address.
  • Networking information.
  • .REVOLUTION File Virus – Encryption Process

    The .REVOLUTION ransomware claims to use RSA-1024 encryption in order to make the files unable to be accessed again. The files targeted by this ransomware infection are often used types of files. But .revolution file virus is also careful to skip encrypting files in the system folders of Windows so that it is possible for the victim to still use the computer. The files targeted for encryption may have the following file extensions embedded to them:


    After the encryption has completed, the ransomware virus adds the .revolution file suffix to the files, making them look like the following:

    Remove Revolution Ransomware and Restore .revolution Encrypted Files

    To fully remove this ransomware virus, it is strongly advisable to focus on following the instructions for removal below. Since manual instructions cannot guarantee that you will fully remove .revolution file virus, automatic removal is always recommended. The best way to remove .revolution ransomware automatically according to security experts is using an anti-malware software which will delete all objects associated with this virus and make sure your computer is protected in the future as well.

    If you want to restore files, encrypted with the .revolution file extension, it is recommended to try out the methods in step “2. Restore files encrypted by .REVOLUTION Ransomware” below. They are in no way 100% effective for restoring all your files but may help recover most of your important files after all.


    Ventsislav Krastev

    Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

    More Posts - Website

    Follow Me:

    Leave a Comment

    Your email address will not be published. Required fields are marked *

    Time limit is exhausted. Please reload CAPTCHA.

    Share on Facebook Share
    Share on Twitter Tweet
    Share on Google Plus Share
    Share on Linkedin Share
    Share on Digg Share
    Share on Reddit Share
    Share on Stumbleupon Share