Home » Blog » Cybersecurity » How to remove .wcry ransomware and decrypt files
wcry ransomware

How to remove .wcry ransomware and decrypt files

WanaCry ransomware encrypts files, changes the file extensions to .wcry, and demands a ransom to decrypt the files.

If your file extensions have been replaced with .wcry then your computer is infected with a computer virus named WanaCry. The computer virus is ransomware that uses NSA’s EternalBlue exploit and drops NSA’s DoublePulsar malware to infect computers that use versions of the Microsoft Windows Operating System. When the ransomware infects a computer it will append the .wcry, .wcryt, .wncry, or .wncrrytt extension to the file name and hold the files ransom.

wcry ransomware

The ransomware infection will encrypt personal files that match certain file extensions, change the filenames, change the file types, and add a new file extension such as [extension_name].wcry  to the end of each file it encrypts. The encryption process will make the files inaccessible to the owner. It will then download a ransom note (possibly named @Please_Read_Me@.txt) in every folder it encrypts files in. The ransom note explains what happened and how to pay the ransom by emailing the malware authors.


What happened to my files?

Mmany of your pictures, documents, databases and all other important files are no longer accessible, as they have been encrypted using AES-128 government grade encryption.

Can I recover my files?

Of course you can! But be quick, time is running out. (Refer to countdown clock) You have two days (48 hours) to deliver payment. After payment, refer to the <Contact Us> button, and email us the Payment Hash, along with your victim ID. The payment will then be confirmed, and decryption key will be sent to you. You will then have all your files back!

This is a malware infection that is operated by malware authors. Contacting cyber criminals is not always suggested unless it is the last resort. Every year many ransom payments are paid out to cyber criminals even though the infection could have been removed by other means. In many cases paying the cyber criminals to restore your files will not work and your money will be lost. Also keep in mind that the infection will not be removed from your computer and it may reoccur unless you properly remove it. Paying the malware authors does not actually eradicate malicious files from your computer.

Wcry virus and other types of ransomware are usually spread by malicious emails, social media content, torrents, and advertisements on malicious or hijacked websites. Most ransomware ill utilize an email campaign to reach hundreds of thousands of people. The emails may appear to be someone you know, your bank, or a legitimate service.

The free instructions on this page will help you remove Wcry ransomware, viruses, malware, and decrypt files appended the .wcry extension. Follow each step below to remove this infection and secure your computer from malicious threats. On the bottom of this guide you will also find recovery and decryption software for various ransomware infections.

1. Remove Wcry with Malwarebytes


  1. Open your browser window and download Malwarebytes 3.0 Premium or Malwarebytes Anti-Malware Free.
  2. Open the executable file (mb3-setup.exe) to begin installing Malwarebytes.
  3. Select your language, click Next, then select “I accept the agreement,” click the Next button several times, and then click the Install button to install Malwarebytes. Click Finish once the install process is complete.
  4. Open Malwarebytes and click the Scan Now button on the Dashboard to begin scanning your computer.
  5. Click the Quarantine Selected button once the scan is finished.
  6. If Malwarebytes says “All selected items have been removed successfully. A log file has been saved to the logs folder. Your computer needs to be restarted to complete the removal process. Would you like to restart now?” click the Yes button to restart your computer.

2. Remove trace files with HitmanPro


  1. Open your browser window and download HitmanPro.
  2. Open the executable file (hitmanpro_x64.exe or hitmanpro_x32.exe) to begin installing HitmanPro.
  3. Click the Next button, check “I accept the terms of the license agreement,” and click the Next button again.
  4. On the Setup page select “Yes, create a copy of HitmanPro so I can regularly scan this computer (recommended)” and add your email address to the registration fields to begin the free trial.
  5. Click Next to begin scanning your computer.
  6. Once the Scan results are displayed click the Next button and click the Next button again on the Removal results page.

3. Clean up and repair issues with CCleaner


  1. Open your browser window and download CCleaner Professional or CCleaner Free.
  2. Open the executable file (ccsetup.exe or other) to begin installing CCleaner.
  3. Click the Install button to begin stalling the program.
  4. Click Run CCleaner to open the program when installation is complete.
  5. Select the Cleaner tab and click the Analyze button.
  6. When the Analyze process is complete click the Run Cleaner button to clean all files.
  7. Next, select the Registry tab and click the Scan for Issues button to scan for issues in your registry.
  8. When the scan is complete click the Fix selected Issues button and Fix All Selected Issues button to fix the issues.
  9. Next, select the Tools tab and click Startup. Examine each area, search for suspicious entries, and delete any suspicious startup entries by selecting the entry and clicking the Delete button.
  10. Next, click Browser Plugins and search each internet browser for unwanted browser add-ons and extensions. Click the extension you want to delete and click the Delete button to remove it.

Decryption Software

wanakiwi Decryptor for Wcry Download
gentilkiwi/wanadecrypt Decryptor for Wcry Download

File Recovery Software

Shadow Explorer Restores lost or damaged files from Shadow Copies Download (Free)
Photorec Recovers lost files Download (Free)
Recuva Recovers lost files Download (Free) | Buy

Lead Editor

Jared Harrison is an accomplished tech author and entrepreneur, bringing forth over 20 years of extensive expertise in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. He has made significant contributions to the industry and has been featured in multiple esteemed publications. Jared is widely recognized for his keen intellect and innovative insights, earning him a reputation as a respected figure in the tech community.

More Reading

Post navigation

Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

How to remove Zbot (Virus Removal Guide)

Remove Puma Virus and Recover Files Encrypted With .puma

How to recover files with the .like file extension (Free Guide)