Roger Ransomware


Roger is a Ransomware virus that is programmed to encrypt its victim’s files, thus rendering the affected data inaccessible. Roger doesn’t show symptoms during the encryption but it reveals its presence through a ransom note once the files have been locked.

Roger Ransomware

The Roger Virus will encrypt your files

If all the files present in the hard drives of your computer cannot be accessed because Roger has locked them up, then you need to learn about the options that are in front of you right now so that you can choose the best and most optimal one for your situation. Here, we will try to offer you as much help as possible against this malicious virus and provide you with guidance that should allow you to remove the threat and may even enable you to restore some of the locked files without having to opt for the ransom payment. Therefore, we strongly advise you to read the following lines and then try out our guide so that you can manage to minimize the unpleasant consequences of the attack from this piece of malware.

The Roger virus

The Roger virus is a harmful virus for Windows PC that doesn’t allow its victims to access their private files unless they pay for a private key. The Roger virus informs the targeted users about the demanded payment through a notepad note.

Ransomware threats like this one are aimed at making you release a payment in exchange for which you would supposedly receive a private key that will release your files. A ransom note generated on the infected computer’s desktop is what notifies the user about the demanded payment and about the way they it is supposed to be transferred. Many ransomware victims may actually see this and think to themselves that paying could be a needed compromise that would allow them to restore the locked files. The problem here is that there really isn’t any guarantee that paying would automatically result in receiving the private key for the data’s decryption. For all you know, there may be no such key on the hackers’ computers, or if there is, the hackers may simply refuse to give it to you even after the money has been transferred.

The Roger file extension

The Roger file extension is a string of characters that is added to the name of each encrypted file. The Roger file extension isn’t recognizable by any program and further ensures that the user cannot open their files without the private key.

The guide you will see below offers instructions on how to clean your computer from the Ransomware and we urge you to follow those instructions. While removing Roger won’t immediately set your files free, it will give you the freedom to try some alternative recovery methods that may get you some of your data back. Some of these methods are provided in the next part of the guide that focuses on file recovery, so after you remove the virus you are advised to go there and try out our file-restoration suggestions.


Name Roger
Type Ransomware
Danger Level High (Ransomware is by far the worst threat you can encounter)
Symptoms Most Ransomware infections go unnoticed as they show no symptoms until all files are locked, which is when the ransom note gets generated.
Distribution Method Fake and misleading online offers, spam messages and notifications, pirated software, and more.
Data Recovery Tool Not Available
Detection Tool

Remove Roger Ransomware

Roger Ransomware

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Roger Ransomware


Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

Roger Ransomware

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Roger Ransomware
Drag and Drop File Here To Scan
Roger Ransomware
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.

    After you open their folder, end the processes that are infected, then delete their folders. 

    Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections.

    Roger Ransomware

    Hold the Start Key and R –  copy + paste the following and click OK:

    notepad %windir%/system32/Drivers/etc/hosts

    A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

    Roger Ransomware

    If there are suspicious IPs below “Localhost” – write to us in the comments.

    Type msconfig in the search field and hit enter. A window will pop-up:

    Roger Ransomware

    Go in Startup —> Uncheck entries that have “Unknown” as Manufacturer.

    • Please note that ransomware may even include a fake Manufacturer name to its process. Make sure you check out every process here is legitimate.

    Roger Ransomware

    Type Regedit in the windows search field and press EnterOnce inside, press CTRL and F together and type the virus’s Name. 

    Search for the ransomware  in your registries and delete the entries. Be extremely careful –  you can damage your system if you delete entries not related to the ransomware.

    Type each of the following in the Windows Search Field:

    1. %AppData%
    2. %LocalAppData%
    3. %ProgramData%
    4. %WinDir%
    5. %Temp%

    Delete everything in Temp. The rest just check out for anything recently added. Remember to leave us a comment if you run into any trouble!

    Roger Ransomware 

    How to Decrypt Roger files

    We have a comprehensive (and daily updated) guide on how to decrypt your files. Check it out here.

    If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


    About the author


    Brandon Skies

    Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.

    Leave a Comment