Home » Blog » Cybersecurity » How to remove WanaCry ransomware and decrypt encrypted files

How to remove WanaCry ransomware and decrypt encrypted files

WanaCry ransomware is a dangerous computer virus that takes hostage of your computer files for a ransom.

The WanaCry virus is ransomware that uses NSA’s EternalBlue exploit and drops NSA’s DoublePulsar malware to infect computers that use versions of the Microsoft Windows Operating System. This includes computers that run Windows 7, Microsoft Server 2008, and other versions of the operating system. When the ransomware infects a computer it will append the .wcry, .wcryt, .wncry, or .wncrrytt extension to the file name and hold the files ransom.


The WanaCry virus is very popular and is spreading very fast. You might have even heard about WanaCry ransomware on the news. It is responsible for infecting over 250,000 personal computers in 150 countries. Many news outlets have reported that WanaCry is even know to infect hospitals in order to extort money.

WanaCry ransomware is an EternalBlue exploit, which is a cyberspying tool that was previously stolen from the National Security Agency (NSA) and published online by a hacker group called Shadow Brokers. The NSA’s EternalBlue exploit targets Windows CVE-2017-0145 vulnerability in Microsoft’s implementation of SMB (Server Message Block) protocol even though the vulnerability has been patched since May 14th of 2017. This concludes that the ransomware infects outdated versions of Microsoft Windows.

The ransomware will use a trojan to drop the exploit on the computer it infects. The most recent variants of WanaCry ransomware are distributed via girlfriendbeautiful[.]ga/hotgirljapan.jpg?i=1 in APAC region. Once the ransomware infects the targeted computer it creates a random folder in C:\ProgramData. The folder created by the ransomware contains executable files named tasksche.exe, mssecsvc.exe, and tasksche.exe; However, the mssecsvc.exe and tasksche.exe files can might also and only be found in C:\Windows.

The virus executes the Icacls . /grant Everyone:F /T /C /Q command in order to obtain complete access to all the files on the computer it infects. The ransomware will then connect to domain in order to infect the machine.

The free instructions on this page will help you remove WanaCry ransomware, viruses, malware, and decrypt encrypted files. Follow each step below to remove this infection and secure your computer from malicious threats. On the bottom of this guide you will also find recovery and decryption software for various ransomware infections.

1. Remove WanaCry with Malwarebytes


  1. Open your browser window and download Malwarebytes 3.0 Premium or Malwarebytes Anti-Malware Free.
  2. Open the executable file (mb3-setup.exe) to begin installing Malwarebytes.
  3. Select your language, click Next, then select “I accept the agreement,” click the Next button several times, and then click the Install button to install Malwarebytes. Click Finish once the install process is complete.
  4. Open Malwarebytes and click the Scan Now button on the Dashboard to begin scanning your computer.
  5. Click the Quarantine Selected button once the scan is finished.
  6. If Malwarebytes says “All selected items have been removed successfully. A log file has been saved to the logs folder. Your computer needs to be restarted to complete the removal process. Would you like to restart now?” click the Yes button to restart your computer.

2. Remove trace files with HitmanPro


  1. Open your browser window and download HitmanPro.
  2. Open the executable file (hitmanpro_x64.exe or hitmanpro_x32.exe) to begin installing HitmanPro.
  3. Click the Next button, check “I accept the terms of the license agreement,” and click the Next button again.
  4. On the Setup page select “Yes, create a copy of HitmanPro so I can regularly scan this computer (recommended)” and add your email address to the registration fields to begin the free trial.
  5. Click Next to begin scanning your computer.
  6. Once the Scan results are displayed click the Next button and click the Next button again on the Removal results page.

3. Clean up and repair issues with CCleaner


  1. Open your browser window and download CCleaner Professional or CCleaner Free.
  2. Open the executable file (ccsetup.exe or other) to begin installing CCleaner.
  3. Click the Install button to begin stalling the program.
  4. Click Run CCleaner to open the program when installation is complete.
  5. Select the Cleaner tab and click the Analyze button.
  6. When the Analyze process is complete click the Run Cleaner button to clean all files.
  7. Next, select the Registry tab and click the Scan for Issues button to scan for issues in your registry.
  8. When the scan is complete click the Fix selected Issues button and Fix All Selected Issues button to fix the issues.
  9. Next, select the Tools tab and click Startup. Examine each area, search for suspicious entries, and delete any suspicious startup entries by selecting the entry and clicking the Delete button.
  10. Next, click Browser Plugins and search each internet browser for unwanted browser add-ons and extensions. Click the extension you want to delete and click the Delete button to remove it.

Decryption Software

wanakiwi Decryptor for WanaCry Download
gentilkiwi/wanadecrypt Decryptor for WanaCry Download

File Recovery Software

Shadow Explorer Restores lost or damaged files from Shadow Copies Download (Free)
Photorec Recovers lost files Download (Free)
Recuva Recovers lost files Download (Free) | Buy

Lead Editor

Jared Harrison is an accomplished tech author and entrepreneur, bringing forth over 20 years of extensive expertise in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. He has made significant contributions to the industry and has been featured in multiple esteemed publications. Jared is widely recognized for his keen intellect and innovative insights, earning him a reputation as a respected figure in the tech community.

More Reading

Post navigation

Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

How to Remove Ransomware and Recover Decrypted Files

How to remove Beer Ransomware and recover files (Free Guide)

How To Disable Java (Java Exploit Fix For JRE 1.6 – JRE 1.7)