DDDPP ransomware (Decryption Methods Included) - Free Guide

DDDPP virus Removal Guide

What is DDDPP ransomware?

DDDPP ransomware is the threat that shows ransom payment instructions and information about the encryption process on the FileRestore.html file

DDDPP ransomwareDDDPP ransomware is the virus that claims to have a decryption tool so you will believe the criminals and pay up. DDDPP ransomware – a version of the cryptovirus that selects particular files for encoding and affects the rest by modifying or even corrupting them permanently. PPDDDP ransomware is the primary variant of this family that was more active at the end of 2019, so this newer version is the one that got slightly updated and altered to affect more devices and run more dangerous campaigns. It still has some features of the initial code, and they help researchers to determine that cryptovirus is from the same developers. The ransom note FileRestore.html is the same that was used a few months back, information on the program window is also the same. The contact email is changed, and now criminals want you to contact them via crptcloud@protonmail.ch to get the full ransom amount settled and receive additional information about possible decryption software.

However, we don't recommend keeping away from any contact between you and those criminals. This is an important thing because ransomware payload can be distributed via email attachments and malicious actors can possibly spread more malware programs on the machine by sending scripts directly to you. There is no possibility to decrypt files using official software because experts haven't analyzed the threat enough to come up with such an application. Also, since this ransomware manages to corrupt some of the files in selected folders, you may lose files permanently and there is pretty much nothing that could help you with such data affected by the DDDPP ransomware virus issue.

Name DDDPP ransomware
Family PPDDDP cryptovirus family known since 2019 December
File extension .dddpp is te marker that comes at the end of every file encoded alongside the name of the directory, contact email address of criminals and possibly other ransom information that is changed per each victim and virus spreading campaign.
Additional features The malware selects folder with files and randomly chooses which data gets encrypted, which corrupted or which altered because, besides encoding, the virus changes the original logo of some files and damages other data directly making them worth 0Kb
Distribution This is a typical ransomware, so methods of spreading include spam email attachments, breaking through unprotected RDP configurations and using exploit kits, relying on vulnerabilities and other malware
Damage Any blackmail-based threat is dangerous because it involves money demands and data that may get permanently damaged or lost
Contact information crptcloud@protonmail.ch
Ransom note FilesRestore.html gets opened and added on the desktop when malware is done with file-encryption procedures[1]
Elimination You should remove DDDPP ransomware using anti-malware tools and security programs that can detect the threat, malicious files and other programs related to this or additional virus. Such applications are designed to fight malware like cryptovirus
Recovery You need to restore files after encryption, but system changes and various applications that malware installs behind your back significantly affects the performance and security of your machine. So get FortectIntego or a system optimizer to get those affected files fixed and repaired

DDDPP ransomware manages to infiltrate the system and run in the background even when you cannot use the machine normally and notice those changes or activities of the malware. Even though ransomware is a type of malware that focuses on encrypting and blackmailing, you need to note that there are other functions this virus can have. All the secondary payloads and initial cryptovirus functions depend on malicious actors who developed and distributed this threat.

When the threat lands on your device it manages to silently run in the system and runs all the wanted processes like data exfiltration, disabling of the system security programs, and the main encryption. DDDPP ransomware belongs to the family that is somewhat selective with the files that get encrypted during the attack.

DDDPP ransomware finds folders, and some of the data there gets encoded, some corrupted or damaged. When these alterations are done it shows the following ransom note:

Your files has been encrypted!
We have encrypted your files. Yes we know that it's shitty but it's not a disasster .
You are able to decrypt all files without aftermath for a 48 hours.
If time will expire you'll unable to restore your files.
We'll format your disk and delete decryption keys from our database.
Don't waste your time to check backups, it's also encrypted or deleted.
Your ID: a8e76a349f865b6299983810252 ***** [32 characters total]
You can buy BTC on one of this sites:
To get the decryptor you need to send mail with your ID to crptcloud@protonmail.chThen you will receive mail with price, instruction for payment and decryption.
No Payment = No decryption
You really get the decryptor after payment
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders other users are not compatible with your data, because each user's unique encryption key

FileRestore.html file is the program window with ransom note, but DDDPP ransomware virus is not determining the particular amount of ransom you will need to pay for decryption tool right away. This is why contact email is also on the message. However, when you contact them and still decide not to pay, you may end up with a damaged machine and even exposed to more dangerous malware.

Do not piss off malicious actors, don't write them and remove DDDPP ransomware instead. If you do that as soon as you get the ransom message, you can avoid bigger system issues and malware infections that may end up sent to you by criminals themselves. These people are unpredictable, and more recent campaigns[2] of such malware shows that they can be exceptionally malicious people. DDDPP ransomware virusDDDPP ransomware is the program that should be removed using antivirus tools and proper security applications. The best option for DDDPP ransomware removal is automatic anti-malware programs capable of detecting and removing such threats and other possibly malicious programs, files or tools. When the AV engine runs a full system scan it manages to check additional places on the computer where some malicious scripts can get hidden and programs installed.

Proper detection also depends on the database antivirus tools use because not all of them get updated frequently enough to include all the newest threats and malware samples. So make sure to rely on professional software and tools that can find DDDPP ransomware and terminate all associated programs. To make sure that the process is successful – run a few tools of similar functionality to double-check.

These anti-malware programs can be exceptionally powerful in such processes as malware termination, but files that get damaged and encrypted or even system functions that become disabled due to affected files, and apps are not going to get repaired when you clean the system from DDDPP ransomware. For these repair processes, you need to get the proper system repair application or the optimization tool like FortectIntego.

When you are sure that all parts of the machine get repaired and managed to get rid of the threat with methods that experts[3] recommended, you can go for data recovery. Only when DDDPP ransomware is no longer active because second round of encryption damages your files forever. Data backups are the best option because you can replace affected files with safe copies this way. If you don't have anything like that – rely on third-party data restoring programs. A few of them are listed below. DDDPP crypto malwareDDDPP ransomware is the file-encryption based virus that manages to corrupt some of the files in the same folders with encoded data.

Main methods of distribution of crypto-ransomware

This is a common ransomware that is not different than other cryptocurrency-extortion based threats, so there are many spreading methods that can be used to deliver this virus. Main techniques have one particular feature – malicious files that get either downloaded from peer-to-peer networks, torrents or different sharing platforms.

Also, spam email attachments include malicious-macro filled documents that need to get opened to trigger the malware scripts. This is how trojan downloaders, installers, backdoors end up on the system and can directly load the notorious ransomware. You cannot notice any of these processes because scripts land directly in the system folders and start running in the background. Exploit kits and hacked sites can also deliver payload for you, so file downloads with special tools or hyperlinks and remote control attacks can damage your device.

The most important thing to note is to check files you download with security tools, AV programs before opening and stay away from suspicious emails, especially when the notification has attachments.

Stay from paying, remove DDDPP ransomware virus ASAP

DDDPP ransomware virus developers scare people by claiming that virus can self decrypt if you run the AV tool or that decryption and file recovery is not possible unless you pay the demanded amount. These are all tactics of tricking victims into transferring Bitcoins to malware creators.

You shouldn't even consider paying because criminals have many goals and none of them are related to your security or data and recovery of the already affected systems. You need to remove DDDPP ransomware and terminate all the related processes, so nothing is affected further than data in those folders that got encrypted already.

Make sure to get professional anti-malware tools like SpyHunter 5Combo Cleaner, or Malwarebytes and perform the DDDPP ransomware removal. Then manage to repair system functions and files affected by this malware using FortectIntego. Only after these recovery procedures and when the machine is newly secured you can restore files that got encrypted or corrupted during the attack.

do it now!
Fortect Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of DDDPP virus. Follow these steps

Manual removal using Safe Mode

Go for the better solution of DDDPP ransomware removal and reboot the machine in the Safe Mode with Networking

Important! →
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.

Step 1. Access Safe Mode with Networking

Manual malware removal should be best performed in the Safe Mode environment. 

Windows 7 / Vista / XP
  1. Click Start > Shutdown > Restart > OK.
  2. When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
  3. Select Safe Mode with Networking from the list. Windows 7/XP
Windows 10 / Windows 8
  1. Right-click on Start button and select Settings.
  2. Scroll down to pick Update & Security.
    Update and security
  3. On the left side of the window, pick Recovery.
  4. Now scroll down to find Advanced Startup section.
  5. Click Restart now.
  6. Select Troubleshoot. Choose an option
  7. Go to Advanced options. Advanced options
  8. Select Startup Settings. Startup settings
  9. Press Restart.
  10. Now press 5 or click 5) Enable Safe Mode with Networking. Enable safe mode

Step 2. Shut down suspicious processes

Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Click on More details.
    Open task manager
  3. Scroll down to Background processes section, and look for anything suspicious.
  4. Right-click and select Open file location.
    Open file location
  5. Go back to the process, right-click and pick End Task.
    End task
  6. Delete the contents of the malicious folder.

Step 3. Check program Startup

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Go to Startup tab.
  3. Right-click on the suspicious program and pick Disable.

Step 4. Delete virus files

Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:

  1. Type in Disk Cleanup in Windows search and press Enter.
    Disk cleanup
  2. Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
  3. Scroll through the Files to delete list and select the following:

    Temporary Internet Files
    Recycle Bin
    Temporary files

  4. Pick Clean up system files.
    Delete temp files
  5. You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):


After you are finished, reboot the PC in normal mode.

Remove DDDPP using System Restore

System Restore feature provides the opportunity to recover machine in the previous state when DDDPP ransomware was not running, and files haven't been affected

  • Step 1: Reboot your computer to Safe Mode with Command Prompt
    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of DDDPP. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with FortectIntego and make sure that DDDPP removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove DDDPP from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

If your files are encrypted by DDDPP, you can use several methods to restore them:

Data Recovery Pro for the rescue when your files get encrypted or accidentally deleted

You should try third=party software designed for recovering files and terminating the damage that malware like DDDPP ransomware makes

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by DDDPP ransomware;
  • Restore them.

Windows Previous Versions is the feature useful for file recovery

If you enable System Restore feature, Windows Previous versions can help you with files later on

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

ShadowExplorer – a method for data recovery

Shadow Volume Copies, when left untouched can provide another option that restores encrypted files

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Decryption tool is not developed yet for DDDPP ransomware virus

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from DDDPP and other ransomwares, use a reputable anti-spyware, such as FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes

How to prevent from getting ransomware

Stream videos without limitations, no matter where you are

There are multiple parties that could find out almost anything about you by checking your online activity. While this is highly unlikely, advertisers and tech companies are constantly tracking you online. The first step to privacy should be a secure browser that focuses on tracker reduction to a minimum.

Even if you employ a secure browser, you will not be able to access websites that are restricted due to local government laws or other reasons. In other words, you may not be able to stream Disney+ or US-based Netflix in some countries. To bypass these restrictions, you can employ a powerful Private Internet Access VPN, which provides dedicated servers for torrenting and streaming, not slowing you down in the process.

Data backups are important – recover your lost files

Ransomware is one of the biggest threats to personal data. Once it is executed on a machine, it launches a sophisticated encryption algorithm that locks all your files, although it does not destroy them. The most common misconception is that anti-malware software can return files to their previous states. This is not true, however, and data remains locked after the malicious payload is deleted.

While regular data backups are the only secure method to recover your files after a ransomware attack, tools such as Data Recovery Pro can also be effective and restore at least some of your lost data.

About the author
Julie Splinters
Julie Splinters - Anti-malware specialist

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Julie Splinters
About the company Esolutions