This article will aid you in removing the Viki ransomware absolutely. Follow the ransomware removal instructions given at the bottom of the article.
The Viki ransomware has been discovered by the malware researcher Marcelo Rivero. It will encrypt your files, while adding the .viki extension to all of them. The Viki virus will display a ransom message written both in the Russian and English languages. The malware threat might also be known as CryptoViki. Read on to see how you can potentially recover some of your data.
|Short Description||The ransomware virus will encrypt your files and show a message screen with ransomware instructions for payment, both in Russian and English.|
|Symptoms||The ransomware will encrypt your files while placing the .Viki extension to them.|
|Distribution Method||Spam Emails, Email Attachments|
See If Your System Has Been Affected by Viki
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Viki.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Viki Ransomware – Spread
Viki ransomware might spread its infection via different ways. The payload file which executes the malicious script for this ransomware, that in turn infects your computer machine, is circling around the Internet. A sample of this ransomware has been found by the malware researcher Marcelo Rivero.
Viki ransomware could also spread its payload file on social media sites and file-sharing networks. Freeware applications which are found on the Web could be presented as helpful but at the same time could be hiding the malicious script for this cryptovirus. Don’t be opening files right when you have downloaded them, especially if they come from sources such as suspicious links or emails. Instead, you should scan them beforehand with a security tool, while also checking the sizes and signatures of those files for anything that seems unusual. You should read the ransomware preventing tips in our forum section.
Viki Virus – In-Depth Analysis
Viki is how this new cryptovirus is dubbed, although it is also known as CryptoViki. After your files get encrypted, they will all receive the .Viki extension. The Viki ransomware could make entries in the Windows Registry aiming to achieve a higher level of persistence. Those registry entries are typically designed in a way that will start the virus automatically with each launch of the Windows Operating System. An example of such an entry is the following:
The ransom note will appear after the encryption process is completed. The note provides instructions on how you could get your files restored. The note of Viki is stored in a file called “readme.txt”. You can preview the contents from the snapshot provided here below:
The ransom message inside that .txt file reads the following:
Aa¢é oaééfi éuée cédéédiééifi.
xoiau oafioeooiaaofi éa, fiai iAiaoiaeii iaiefiaou iefifiii
ia yéééoOiiiué aaoafi cryptovikiegmai1.com
Aaéaa 50 iiéo+éoa afia iaiaoiaéifia éifiodoéoéé.
liifioéé oaidéobiaaofi fiaiifioiyoaéfiii ia ibééaaoo ie é , ébiia éacaicaoaoiié iibédé
Afiéé so an, oioéoé iiiuoaofifiy, oi ideaaaOéoaéUii fiéééaéoé bacébéiua éiiéé oaééia,
eia+a a fiéo+aa
ea éciéiaiéy oafidéobiééa fioaiao iaéiciiaiié ié ibé éaéeo ofiéiééyo.
Your files have been encrypted.
To decrypt them, You need to write a letter
to the email address email@example.com
Next, you will receive all necessary instructions.
Attempts to decipher alone will not lead to anything other than irretrievable loss of
If you still want to try, make a backup of the files, or in the case
they change the decryption will be impossible under any circumstances.
As clearly seen from the ransom message above, the developer of the Viki virus wants you to contact them so you can pay an unspecific ransom sum. However, if you get your personal computer infected with the malware, you should NOT under any circumstances pay anything to the cybercriminals. Nobody can give you a guarantee that you will get your files decrypted upon payment, plus you might motivate them to do more criminal activities, once they get money for their wrongdoings.
Besides the note which is stored in the readme.txt file, there is also an image that is set as your Desktop wallpaper, seen below:
As you can see it is also written in Russian and English. The text is the following:
Внимание! Все ваши диски зашифрованы!
Подробности в файле readme.txt
Attention! All your disks are encrypted!
The details are in the file readme.txt
Viki Virus – Encryption Process
Viki ransomware will search and encrypt files, which have the following extensions:
→.doc, .docx, .jpg, .odt, .pdf, .ppt, .pptx, .psd, .rtf, .xls, .xlsx, .ppt, .pptx
The above is not an official list of extensions that are encrypted, so more extensions could also be sought to get locked by the Viki ransomware. The algorithm which is used for the locking of your files is not known for the time being.
The Viki cryptovirus might be set to erase the Shadow Volume Copies from the Windows Operating System by initiating the following command:
→vssadmin.exe delete shadows /all /Quiet
The command’s execution typically makes the encryption process more viable, since it eliminates one of the prominent ways for the restoration of your files.
Remove Viki Virus and Restore .Viki Files
If your computer got infected with the Viki ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.
Manually delete Viki from your computer
Note! Substantial notification about the Viki threat: Manual removal of Viki requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.