Severity scale:  

Remove Oblivion ransomware (Virus Removal Guide) - Free Instructions

removal by Linas Kiguolis - - | Type: Ransomware

Oblivion ransomware is a dangerous virus from Scarab family

Oblivion ransomware

Oblivion ransomware is a crypto-virus that encodes a variety of personal files on users computers. It uses AES[1] cipher and adds .OBLIVION extension to each of the encrypted files. The malware drops a ransom note called OBLIVION Decryption Information.txt where hackers ask victims to contact them via  or email and arrange the payment in BTC for data release.

Name Oblivion ransomware
Type File locking virus
Cipher used AES
Fille extension .OBLIVION
Contact email or
Danger level High. Encrypts all files which might never be decrypted
Distribution Spam email attachments, malicious websites, etc.
Elimination  Automatic only – download and install Reimage Reimage Cleaner Intego or Malwarebytes

Oblivion virus was first noticed in late April 2018 and is a variation of Scarab ransomware. Therefore, it is sometimes referred to as Scarab-Oblivion ransomware. Scarab malware was first spotted a few years ago and since then keeps coming back with newer and even more sophisticated versions, and Oblivion is one of them.

Ransomware is a dangerous threat as victims are at risk of losing their files permanently. We provide file recovery procedures below, so make sure to check them out. But, first of all, you need to remove Oblivion ransomware using powerful security software – we recommend Reimage Reimage Cleaner Intego or Malwarebytes.

Oblivion ransomware typically enters machines via contaminated spam email attachments or malicious files from the internet. As soon as it gets inside the computer, it alters the array of settings. This allows the file-locker to load itself with every Windows boot up.

After strengthening its presence, the crypto locker appends .OBLIVION extension and converts file names into randomly generated alphanumerics. For example, if you had a file called picture.jpg, it will be turned into EuUDruppb9kjgkw5HlgzXo.OBLIVION. From this point, these files are encrypted and need to be unlocked using a specific key that is held on a remote server.

Oblivion ransomware authors abuse this situation and ask for money in return. The victim is asked to contact them via or email and is warned that any complaints will result in permanent blockage of data as they will never provide the key. Cybercrooks request to resolve the issue “in a friendly situation.”

However, contacting hackers is not a smart move. First of all, if they are trying to extort money in such illegal way – they might as well not send you the key back, even after the payment is processed. In other cases, you might receive a contaminated file that may install other malware on your computer. Furthermore, hackers might target your machine again, knowing that you are willing to pay.

Thus, do not contact Oblivion virus authors. These people cannot be trusted. Instead, proceed with Oblivion ransomware removal. After you get rid of the virus, you can then start thinking about ways how to recover your files. Unfortunately, the only trustworthy way to get your data back is from a remote backup, such as cloud server or external HDD that was not connected to the PC during contamination.

If you did not have your files backed up, there are some alternative methods that you can try. All the instructions are below this article.

Oblivion virusOblivion ransomware is a deadly virus that encrypts personal files using .OBLIVION appendix. To unlock the data, users need to get a key that is stored on a remote server.

Be careful when you open emails from unknown sources

Spam emails are still the most prominent ransomware distribution method as it is effective. Thus, cybercrooks send hundreds if not thousands of phishing emails[2] to unsuspecting users. There are quite a few signs that separate illicit email from a genuine one:

  • Users are never referred to using their names (as emails are sent to masses);
  • The email address that the phishing mail was sent from can be very similar to original retailer name, for example, (if not looking carefully one might think that the email is coming from Amazon);
  • Such emails contain attachment in .txt, .doc, .pdf or few other formats and users are urged to open the file persuasively;
  • Quite often, victims are asked to enable a macro function to open the file.

Besides, email providers have a built-in scanner which marks up suspicious emails, so never ignore these warnings!

Other methods of ransomware distribution are through unprotected RDP configuration, exploit kits, fake updates, repacked or cracked software installers, etc.

Get rid of Oblivion ransomware automatically

It is not possible to remove Oblivion virus manually, so don’t even attempt that. The malware runs multiple scripts in different locations of the system and roots deep into the OS.

Instead, you should employ reputable anti-virus software that can take care of Oblivion removal. Helper objects might block the operation of security software; therefore, security specialists[3] recommend entering Safe Mode with Networking.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove Oblivion virus, follow these steps:

Remove Oblivion using Safe Mode with Networking

Enter Safe Mode with Networking by following these steps:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Oblivion

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Oblivion removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Oblivion using System Restore

You can get rid of Oblivion virus by using System Restore:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Oblivion. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that Oblivion removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Oblivion from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

Please do not contact cybercrooks. Not only you risk losing your money, but you will also be financing illegal activities of hackers. Instead, try alternative file recovery methods below.

If your files are encrypted by Oblivion, you can use several methods to restore them:

Try to recover your files using Data Recovery Pro

Data Recovery Pro is a powerful tool that is capable of restoring hard-coded files.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Oblivion ransomware;
  • Restore them.

Windows Previous Versions feature might help

This method is only possible if System Restore function was enabled before the ransomware attack occurred.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Try ShadowExplorer

If you got lucky and shadow volume copies were not deleted by malware, you can use ShadowExplorer to get all your data back.

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Oblivion decryptor is not available yet

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Oblivion and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.

The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login. 

VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Linas Kiguolis
Linas Kiguolis - Expert in social media

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Linas Kiguolis
About the company Esolutions


Your opinion regarding Oblivion ransomware