.Viki File Virus – Remove It and Restore Your Files

.Viki File Virus – Remove It and Restore Your Files

This article will aid you in removing the Viki ransomware absolutely. Follow the ransomware removal instructions given at the bottom of the article.

The Viki ransomware has been discovered by the malware researcher Marcelo Rivero. It will encrypt your files, while adding the .viki extension to all of them. The Viki virus will display a ransom message written both in the Russian and English languages. The malware threat might also be known as CryptoViki. Read on to see how you can potentially recover some of your data.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionThe ransomware virus will encrypt your files and show a message screen with ransomware instructions for payment, both in Russian and English.
SymptomsThe ransomware will encrypt your files while placing the .Viki extension to them.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Viki


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Viki.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Viki Ransomware – Spread

Viki ransomware might spread its infection via different ways. The payload file which executes the malicious script for this ransomware, that in turn infects your computer machine, is circling around the Internet. A sample of this ransomware has been found by the malware researcher Marcelo Rivero.

Viki ransomware could also spread its payload file on social media sites and file-sharing networks. Freeware applications which are found on the Web could be presented as helpful but at the same time could be hiding the malicious script for this cryptovirus. Don’t be opening files right when you have downloaded them, especially if they come from sources such as suspicious links or emails. Instead, you should scan them beforehand with a security tool, while also checking the sizes and signatures of those files for anything that seems unusual. You should read the ransomware preventing tips in our forum section.

Viki Virus – In-Depth Analysis

Viki is how this new cryptovirus is dubbed, although it is also known as CryptoViki. After your files get encrypted, they will all receive the .Viki extension. The Viki ransomware could make entries in the Windows Registry aiming to achieve a higher level of persistence. Those registry entries are typically designed in a way that will start the virus automatically with each launch of the Windows Operating System. An example of such an entry is the following:


The ransom note will appear after the encryption process is completed. The note provides instructions on how you could get your files restored. The note of Viki is stored in a file called “readme.txt”. You can preview the contents from the snapshot provided here below:

The ransom message inside that .txt file reads the following:

Aa¢é oaééfi éuée cédéédiééifi.
xoiau oafioeooiaaofi éa, fiai iAiaoiaeii iaiefiaou iefifiii
ia yéééoOiiiué aaoafi cryptovikiegmai1.com
Aaéaa 50 iiéo+éoa afia iaiaoiaéifia éifiodoéoéé.
liifioéé oaidéobiaaofi fiaiifioiyoaéfiii ia ibééaaoo ie é , ébiia éacaicaoaoiié iibédé
Afiéé so an, oioéoé iiiuoaofifiy, oi ideaaaOéoaéUii fiéééaéoé bacébéiua éiiéé oaééia,
eia+a a fiéo+aa
ea éciéiaiéy oafidéobiééa fioaiao iaéiciiaiié ié ibé éaéeo ofiéiééyo.

Your files have been encrypted.
To decrypt them, You need to write a letter
to the email address [email protected]
Next, you will receive all necessary instructions.
Attempts to decipher alone will not lead to anything other than irretrievable loss of
If you still want to try, make a backup of the files, or in the case
they change the decryption will be impossible under any circumstances.

As clearly seen from the ransom message above, the developer of the Viki virus wants you to contact them so you can pay an unspecific ransom sum. However, if you get your personal computer infected with the malware, you should NOT under any circumstances pay anything to the cybercriminals. Nobody can give you a guarantee that you will get your files decrypted upon payment, plus you might motivate them to do more criminal activities, once they get money for their wrongdoings.

Besides the note which is stored in the readme.txt file, there is also an image that is set as your Desktop wallpaper, seen below:

As you can see it is also written in Russian and English. The text is the following:

Внимание! Все ваши диски зашифрованы!
Подробности в файле readme.txt
Attention! All your disks are encrypted!
The details are in the file readme.txt

Viki Virus – Encryption Process

Viki ransomware will search and encrypt files, which have the following extensions:

→.doc, .docx, .jpg, .odt, .pdf, .ppt, .pptx, .psd, .rtf, .xls, .xlsx, .ppt, .pptx

The above is not an official list of extensions that are encrypted, so more extensions could also be sought to get locked by the Viki ransomware. The algorithm which is used for the locking of your files is not known for the time being.

The Viki cryptovirus might be set to erase the Shadow Volume Copies from the Windows Operating System by initiating the following command:

→vssadmin.exe delete shadows /all /Quiet

The command’s execution typically makes the encryption process more viable, since it eliminates one of the prominent ways for the restoration of your files.

Remove Viki Virus and Restore .Viki Files

If your computer got infected with the Viki ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share