.OGONIA Files Virus (Ransomware) - Remove and Restore Data

.OGONIA Files Virus (Ransomware) – Remove It and Restore Data

This article has been created in order to show you how to remove the .OGONIA file virus, which is a CryptoMix ransomware variant and how to try and get back as many encrypted files as possible without having to pay the ransom to hackers.

A new variant of the CryptoMix ransomware family, known as the .OGONIA virus has been detected by malware researcher Marcelo Rivero to use file encryption and rename important files on the computers infected by it. The virus then drops a file, named HELP_INSTRUCTION.txt in which it asks to contact TankPolice@aolonline.top in order to most likely pay a hefty ransom fee in BitCoins to get the files decrypted and working again. If you have become a victim of the ransomware form of online extortion, it is strongly advisable to not pay the ransom and read this article to learn how to safely remove the .OGONIA CryptoMix ransomware variant and how to restore as many files that have been encrypted by it as possible without paying a ransom.

Threat Summary

Name.OGONIA Virus
TypeRansomware, Cryptovirus
Short DescriptionEncrypts the files on your computer, making them seem corrupt. Asks a payment to be made via e-mail in order to get them to work once more.
SymptomsAdds the .OGONIA file extension to the encrypted files and changes their names to random A-Z 0-9 a-z names. Drops a ransom note, named HELP_INSTRUCTION.txt.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .OGONIA Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .OGONIA Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.OGONIA Ransomware – How Does It Spread

For this virus to be effective it needs to enter your computer. To do this, the virus may use various obfuscation techniques and slither unnoticed on your computer. The cyber-criminals have designed multiple methods by which most ransomware viruses infect. One of them, which Is likely used by .OGONIA ransomware is via malicious e-mail spam messages. Such messages may trick you into opening the malicious files as they pose as legitimate documents or e-mail attachments.

Other methods by which one can become a victim of .OGONIA ransomware include opening fake setups, game cracks, key generators and other types of files uploaded on suspicious sites online.

.OGONIA File Virus – Analysis

Since this ransomware is a variant of the CryptoMix ransomware viruses it has almost identical activity once it enters your computer. It’s first activity is to drop the malicious files responsible for the activity of the virus on the infected computer. They are usually located in the important system folders of the OS under different names:

After dropping the files, the virus may also run them as background processes to perform it’s malicious activities. They may start with attacking the shadow volume copies on the victim PC and deleting them by executing a batch script that runs Windows Command Prompt as an administrator without you noticing it in the background. The script may execute the following command:

After having deleted the shadow copy backups, the .OGONIA virus may also add registry values that may be located in the following registry sub-keys responsible for running programs automatically when Windows starts:


In addition to this, the .OGONIA virus also drops it’s ransom note, named HELP_INSTRUCTION.txt. It has the following contents:

FOR DECRYPT WRITE TO : TankPolice@aolonline.top

.OGONIA File Virus – Encryption Process

The encryption process of the .OGONIA CryptoMix ransomware variant is belived to involve the following important files on the victim’s computer:

→ .sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt.

The virus is programmed to encrypt any type of file of the ones it scans for and make it no longer able to be opened. In addition to this, it also renames the files so that they can no longer be recognized as well. The files encrypted by .OGONIA virus look like the following:

Remove .OGONIA Files Virus and Restore Files

If you want to remove this virus, the first thing you should be doing beforehand is copying the .OGONIA encrypted files on a flash drive or other form of backup, despite the fact that they are already encrypted. After doing so, you can proceed to remove the virus, preferably by following the removal instructions below. They are divided in Automatic and Manual removal. Be advised that security researchers reccomend doing the removal automatically by scanning your computer with a ransomware-specific removal software to detect all the objects associated with the .OGONIA virus on your computer and removing them automatically and safely.

After removing this virus, you are left with renamed files which have to be recovered. We have posted alternative methods on how to restore as many files as possible without paying the ransom. They are located in step “2. Restore files encrypted by .OGONIA Virus” below. They are in no way 100% effective, but we have received reports of victims of ransomware on our forum that they have managed to restore most of their important files using one of the methods.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share