• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

.Wncry files restore – Remove WanaDecryptor virus

Myantispyware team May 12, 2017    

If your images, documents, music and other personal files does not open normally and .WNCRY added at the end of their name then your personal computer is infected with the WanaDecryptor virus from a family of file-encrypting ransomware.

WanaDecryptor WNCRY virus

Table of contents

  1. What is WanaDecryptor ransomware?
  2. Is my system infected with WanaDecryptor virus?
  3. How to decrypt WNCRY files ?
  4. How to remove WanaDecryptor virus?
    • Remove WanaDecryptor virus with MalwareBytes Anti-malware
    • Remove WanaDecryptor virus with Kaspersky virus removal tool
  5. How to restore WNCRY files ?
    • Restore WNCRY files with ShadowExplorer
    • Recover WNCRY files with PhotoRec
  6. How to prevent my computer from becoming infected by WanaDecryptor virus?

Once started, it have encrypted your personal files stored on a computer drives and attached network drives. WanaDecryptor virus uses very strong hybrid encryption with a large key. When the ransomware encrypts a file, it will add the .WNCRY extension to each encrypted file. Once the virus finished enciphering of all files, it will create a file named “@Please_Read_Me@.txt” with an instructions on how to decrypt all encrypted files.

WanaDecryptor offers to make a payment in Bitcoins to decrypt all encrypted files. Important to know, currently not possible to decrypt the .WNCRY files encrypted by the ransomware without the private key and decrypt program.

If you choose to pay the ransom, there is no 100% guarantee that you can get back your files! If you do not want to pay for a decryption key, then you have a chance to restore WNCRY files. Use the step-by-step guide below to remove the virus itself and try to restore all encrypted files.

What is WanaDecryptor ransomware?

WanaDecryptor is a variant of ransomware infection. It affects all current versions of Windows operating systems such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10. This virus uses a hybrid encryption mode to eliminate the possibility of brute force a key, which will allow to decrypt all encrypted files.

When the virus infects a computer, it uses system directories to store own files. To run automatically whenever you turn on your computer, WanaDecryptor ransomware creates a registry entry in Windows: sections HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Run, HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ RunOnce, HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Run, HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ RunOnce.

Immediately after the launch, the virus scans all available drives, including network and cloud storage, to determine which files will be encrypted. The ransomware uses the file name extension, as a way to define a group of files that will be subjected to encrypting. Encrypted almost all types of files, including common as:

0, .1, .1st, .2bp, .3dm, .3ds, .sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt, .wav, .wbc, .wbd, .wbk, .wbm, .wbmp, .wbz, .wcf, .wdb, .wdp, .webdoc, .webp, .wgz, .wire, .wm, .wma, .wmd, .wmf, .wmv, .wn, .wot, .wp, .wp4, .wp5, .wp6, .wp7, .wpa, .wpb, .wpd, .wpe, .wpg, .wpl, .wps, .wpt, .wpw, .wri, .ws, .wsc, .wsd, .wsh, .x, .x3d, .x3f, .xar, .xbdoc, .xbplate, .xdb, .xdl, .xld, .xlgc, .xll, .xls, .xlsm, .xlsx, .xmind, .xml, .xmmap, .xpm, .xwp, .xx, .xy3, .xyp, .xyw, .y, .yal, .ybk, .yml, .ysp, .z, .z3d, .zabw, .zdb, .zdc, .zi, .zif, .zip, .zw

Once a file is encrypted, its extension changed to .WNCRY. Next, the virus creates the files named “@Please_Read_Me@.txt”. This file contain instructions on how to decrypt all encrypted files.

WanaDecryptor ransomware actively uses scare tactics by giving the victim a brief description of the encryption algorithm and showing a threatening message on the desktop. It is trying to force the user of the infected computer, do not hesitate to pay a ransom, in an attempt to recover their files.

Is my system infected with WanaDecryptor ransomware?

Identify that your computer is infected with WanaDecryptor ransomware quite easily. If your personal files, such as documents, photos, music does not open normally, that is, for example, when you try to open a document, Word reports that it is an unknown file type, then it is likely that the document is encrypted, and your computer is infected. Of course, the presence on the desktop a ransom screen or threatening message is a sign of infection.

If you suspect that your system is infected with with WanaDecryptor ransomware, then follow the steps in this guide, see How to remove the WanaDecryptor virus. Another option, shut down the computer, remove the hard drive and check it on another computer.

How to decrypt WNCRY files

Currently there is no available method to decrypt WNCRY files. The ransomware repeatedly tells the victim that uses a strong encryption algorithm with large key. What does it mean to decrypt the files is impossible without the private key. Use a “brute forcing” method is also not a way because of the big length of the key. Therefore, unfortunately, the only payment to the authors of the WanaDecryptor ransomware entire amount requested – the only way to try to get the decryption key.

There is absolutely no guarantee that after pay a ransom to the authors of the WanaDecryptor ransomware, they will provide the necessary key to decrypt your files. In addition, you must understand that paying money to the cyber criminals, you are encouraging them to create a new virus.

How to remove WanaDecryptor virus

There are not many good free anti-malware programs with high detection ratio. The effectiveness of malware removal tools depends on various factors, mostly on how often their virus/malware signatures DB are updated in order to effectively detect modern malicious software, ransomware, adware, browser hijackers and other potentially unwanted programs. We recommend to run several programs, not just one. These programs which listed below will help you remove all components of the WanaDecryptor ransomware from your disk and Windows registry.

Kaspersky Virus Removal Tool and Malwarebytes Anti-malware can detect different types of active ransomware and easily remove it from your computer, but they can not recover encrypted files.

Remove WanaDecryptor virus with MalwareBytes Anti-malware

Get rid of WanaDecryptor virus manually is difficult and often the ransomware is not completely removed. Therefore, we recommend you to use the Malwarebytes Free that are completely clean your personal computer. Moreover, the free program will help you to get rid of malicious software, PUPs, toolbars and ad-supported software that your machine can be infected too.

Download Malwarebytes by clicking on the link below.

Malwarebytes Anti-malware
Malwarebytes Anti-malware
327227 downloads
Author: Malwarebytes
Category: Security tools
Update: April 15, 2020

Once the download is finished, close all software and windows on your system. Open a directory in which you saved it. Double-click on the icon that’s named mb3-setup as shown on the screen below.

malwarebytes setup icon

When the installation begins, you will see the “Setup wizard” that will help you install Malwarebytes on your personal computer.

setup malwarebytes

Once install is complete, you will see window as shown below.

malwarebytes windows10

Now click the “Scan Now” button for scanning your system for the WanaDecryptor ransomware and other malicious software. This process can take some time, so please be patient. While the utility is scanning, you may see count of objects it has identified either as being malware.

malwarebytes win10 detect WanaDecryptor

When it completes the scan, it’ll show a list of found threats. In order to delete all items, simply click “Quarantine Selected” button.

malwarebytes win10 threat scan finished

The Malwarebytes will begin removing WanaDecryptor ransomware related files, folders, registry keys. Once disinfection is done, you may be prompted to reboot your PC.

The following video explains step by step instructions on how to delete malware and ransomware with Malwarebytes Anti-malware.

Remove WanaDecryptor virus with Kaspersky virus removal tool

Kaspersky virus removal tool is a free portable application that scans your system for ransomware, adware, potentially unwanted applications and other malware and helps get rid of them easily.

Download Kaspersky virus removal tool from the link below and save it directly to your Windows Desktop.

Kaspersky virus removal tool
Kaspersky virus removal tool
129280 downloads
Author: Kaspersky® lab
Category: Security tools
Update: March 5, 2018

Double-click on the KVRT icon found on your desktop. Once initialization process is finished, you will see the Kaspersky virus removal tool screen as shown below.

kvrt main window

Click Change Parameters and set a check near all your drives. Click OK to close the Parameters window. Next click Start scan button. Kaspersky virus removal tool will now start scanning your computer for known infections. This procedure can take some time, so please be patient.

kaspersky virus removal tooll scanning

When KVRT has finished scanning, you will see a screen like shown below.

kvrt scan report

Click on Continue to start a cleaning process.

How to restore WNCRY files

In some cases, you can recover files encrypted by ransomware. Try both methods. Important to understand that we cannot guarantee that you will be able to recover all encrypted documents, photos and other files.

Restore WNCRY files with ShadowExplorer

Download ShadowExplorer from the following link.

ShadowExplorer
ShadowExplorer
439627 downloads
Author: ShadowExplorer.com
Category: Security tools
Update: September 15, 2019

Open a directory in which you saved it. Right click to ShadowExplorer-0.9-portable and select Extract all. Follow the prompts. Next please open the ShadowExplorerPortable folder as shown below.

ShadowExplorer folder

Double click ShadowExplorerPortable to run it. You will see the following screen.

ShadowExplorer

In top left corner, select a Drive and a latest restore point as shown on the example below (1 – drive, 2 – restore point).

ShadowExplorer

On right panel look for a file that you want to restore, right click to it and select Export. An example below.

ShadowExplorer restore file

Recover WNCRY files with PhotoRec

Download PhotoRec from the link below.

PhotoRec
PhotoRec
221290 downloads
Author: CGSecurity
Category: Security tools
Update: March 1, 2018

Open a directory in which you saved it. Right click to testdisk-7.0.win and select Extract all. Follow the prompts. Next please open the testdisk-7.0 folder as shown below.

testdisk photorec folder

Double click on qphotorec_win to run PhotoRec for Windows. It will open a screen like below.

PhotoRec for windows

Select a drive to recover from as shown below.

photorec select drive

You will see a list of available partitions. Select a partition that holds the lost and encrypted files. An example below.

photorec select partition

Click on File Formats button and select file types to recover. You can to enable or disable the recovery of certain file types. When this is done, click OK button.

PhotoRec file formats

Next, click Browse button to select where recovered files should be written, then click Search.

photorec

Count of recovered files is updated in real time. All recovered files are written in a folder that you have selected on the previous step. You can to access the files even if the recovery process is not finished.

When the recovery is completed, click on Quit button. Next, open the directory where recovery files are stored. You will see a contents like below.

PhotoRec - result of recovery

All recovered files are written in recup_dir.1, recup_dir.2 … sub-directories. If you are looking for a specific file, then you can to sort your recovered files by extension and/or date/time.

How to prevent my computer from becoming infected by WanaDecryptor ransomware?

Most antivirus programs already have built-in protection system against the ransomware. Therefore, if your computer does not have an antivirus program, make sure you install it. As an extra protection, use the CryptoPrevent.

Download CryptoPrevent from the link below.

www.foolishit.com/download/cryptoprevent/

Run it and follow the setup wizard. Once the installation is completed, you will be shown a window where you can select a level of protection, as shown in the following example.

CryptoPrevent

Click the Apply button to activate the protection.

To sum up

Now your computer should be free of the WanaDecryptor virus. If you need help with the instructions, then ask for help here.

Virus

 Previous Post

How to remove MyDIYGenie [Chrome, Firefox, IE, Edge]

Next Post 

How to remove Hotweb360.com [Chrome, Firefox, IE, Edge]

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

Leave a Reply Cancel reply

New Guides

Lmipki Nano Microneedle Patch Review, Scam or Legit? What You Need to Know
scam alert
Remove Searchernow.com Redirect: Chrome, Edge, Firefox
Avoid the ExLig.com Bitcoin Scam: Insights on Promo Code Frauds
scam alert
Denwex.com Review: Bitcoin Promo Codes as a Scam
scam alert
CEFOLEX.com Review: A Closer Look at the Bitcoin Promo Code Scam

Follow Us

Search

Useful Guides

search.yahoo.com
Remove Search.yahoo.com Redirect Virus ✅ (Quick & Easy) in 2024
Iphone Calendar virus spam
Iphone Calendar Virus/Spam 2022 (Removal guide)
browser redirect virus
How to remove Browser redirect virus [Chrome, Firefox, IE, Edge]
This setting is enforced by your administrator (Removal guide)
How to reset Internet Explorer settings to default

Recent Guides

MyDIYGenie
How to remove MyDIYGenie [Chrome, Firefox, IE, Edge]
class64deal.com
How to remove class64deal.com redirect [Chrome, Firefox, IE, Edge]
b.addshare.men
How to remove b.addshare.men redirect [Chrome, Firefox, IE, Edge]
OnlineWorkSuite
How to remove OnlineWorkSuite [Chrome, Firefox, IE, Edge]
Easy PDF Combine
Easy PDF Combine toolbar – How to remove (Chrome, Firefox, IE, Edge)

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.