What is DD Ransomware and how do I remove it?

DD Ransomware


Learn what DD ransomware is and how to remove the computer virus from your computer and recover files encrypted and given the .DD file extension.

Programs that remove DD Ransomware
Links on this page

What is DD Ransomware?


DD is a file extension associated with a variant of the Scarab ransomware infection. DD ransomware encrypts files on a computer using military grade encryption algorithms, affixes the .DD file extension to the end of the filenames , removes various shadow copies of files, and disables the Windows recovery and repair functions during the boot phase with certain commands. DD ransomware also drops a text file named HOW TO RETURN FILES.TXT that contains ransom payment instructions on the desktop and every drive’s root folder.

DD Ransomware

Here’s an example of what is written in the text file:

Warning all your files are encrypted !!! \ \ ___ / |
/ – _ `- / ‘
To receive the decoder, you must send an email to (/ \ / \ \ \ \ \
your email address with your personal ID: / / | `\
OO) / |
DiskDoctor@protonmail.com `- ^ – ‘` <‘
(_.) _) /
In response you will receive further instructions. `.___ /` /
`—– ‘/
ATTENTION !!! <—-. __ / __ \
* Do not attempt to install the program or run <—- | ==== O))) ==) \) / ====
antivirus software. <—- ‘`-‘` .__, ‘\
* Attempts to self-decrypt files will result in the | |
loss of your data. \ /
* Decoders of other users are incompatible with your ______ ((_ / \ ______
data encryption key. , ‘, —–‘ | \
`- {__________) \ /

Your personal identifier:

DD ransomware uses the text file as a ransom note so that it can explain to the victim what happened to their files and how to make a ransom payment in order to allegedly decrypt the encrypted files (the way the malware author wants you to). It should be noted that paying the ransom will not guarantee that you will recover your files or that the infection is removed and will not appear again in the future.

As previously mentioned, DD ransomware removes shadow copies of files and disables the Windows recovery and repair functions during the boot phase using commands. These are the commands used by the ransomware to perform such a task:

cmd.exe / c wbadmin DELETE SYSTEMSTATEBACKUP

wbadmin.exe wbadmin DELETE SYSTEMSTATEBACKUP

cmd.exe / c wmic SHADOWCOPY DELETE

WMIC.exe wmic SHADOWCOPY DELETE

cmd.exe vssadmin Delete Shadows / All / Quiet

vssadmin.exe vssadmin Delete Shadows / All / Quiet

cmd.exe / c bcdedit / set {default} recoveryenabled No

bcdedit.exe bcdedit / set {default} recoveryenabled No

cmd.exe / c bcdedit / set { default} bootstatuspolicy ignoreallfailures

bcdedit.exe bcdedit / set {default} bootstatuspolicy ignoreallfailures ID

How to remove DD Ransomware


1. Download Malwarebytes Anti-Malware software to scan your computer and remove malicious files and potentially unwanted programs.

2. To install the program, click the file you just downloaded. It can usually be located in the Download folder.

install malwarebytes

3. A window that says “Welcome to the Malwarebytes Setup Wizard” will appear. Click Agree and Install to begin the installation. Once complete, click Finish.

scan now

4. Now the Malwarebytes is installed, open the program and click the Scan Now button – or go to the Scan tab and click the Start Scan button.

quarantine selected

5. When the scan is complete click the Quarantine Selected button.

6. If Malwarebytes says “All selected items have been removed successfully. A log file has been saved to the logs folder. Your computer needs to be restarted to complete the removal process. Would you like to restart now?” click the Yes button to restart your computer.

7. Next, Download HitmanPro to perform a second-opinion scan and remove any remaining malicious trace files.

8. Once installed, open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.

9. When the HitmanPro scan is complete click the Next button.

10. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

11. Click the Reboot button.

File Recovery Software


NAME DESCRIPTION DOWNLOAD
Shadow Explorer Restores lost or damaged files from Shadow Copies Download (Free)
Photorec Recovers lost files Download (Free)
Recuva Recovers lost files Download (Free) | Buy

Troubleshooting


Alternative methods are suggested if there are issues removing DD ransomware from an infected computer.

How to Restore your computer

If a restore point has previously been established on your machine you will be able to perform a system restore in order to restore your machine to a date and time before it was infected. You will lose files on your computer that were obtained prior to the restore point.

There are several options to restore your computer. Most computers have their own restore software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default restore program that can also be found by performing a search.

A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.

How to Recover your computer to factory settings

A system recovery (or reset) will recover your computer to factory settings. You will lose the current programs and files on your computer.

There are several options to recover your computer to factory settings. Most computers have their own recovery software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default recovery program that can also be found by performing a search.

A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.

Sean Doyle

Sean Doyle is a tech author and engineer with over 20 years of experience in cybersecurity, privacy, malware, Google Analytics, online marketing, and other topics. Sean's content has been featured in numerous publications.