Remove Why-Cry Ransomware and Restore .whycry Files
THREAT REMOVAL

Remove Why-Cry Ransomware and Restore .whycry Files

This article will help you remove Why-Cry ransomware absolutely. Follow the ransomware removal instructions at the end of the article.

Why-Cry ransomware is a cryptovirus with screen-locking capabilities and its name is also present in its payload dropper – “WhyCry-Ransomware.exe”. The screenlocker is smart as it shows a fake Windows Update. The ransom message that shows afterward is written in English. The extension .whycry is appended to all encrypted files. Continue to read below to see how you could try to potentially restore some of your files.

Threat Summary

NameWhy-Cry
TypeRansomware
Short DescriptionThe ransomware encrypts files on your computer and later tries to extort you to pay a ransom to get your files back.
SymptomsThe ransomware will encrypt your files while putting up a screenlocker that is presented as a Windows Update service. The update is of course fake and only there to trick users.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Why-Cry

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Why-Cry.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Why-Cry Ransomware – Infection

Why-Cry ransomware might spread its infection with various methods. A payload dropper which initiates the malicious script for this ransomware could be circling around the World as this article is being written. In the case such a file lands on your computer system and you execute it – your computer will become infected. You can see a sample of the payload dropper called “WhyCry-Ransomware.exe” submitted on the VirusTotal service, below:

Why-Cry ransomware might also distribute its payload file on social media and file-sharing services. Freeware which is found on the Web can be presented as helpful also be hiding the malicious script for the cryptovirus. Refrain from opening files right after you have downloaded them. You should first scan them with a security tool, while also checking their size and signatures for anything that seems out of the ordinary. You should read the tips for preventing ransomware found in our forums.

Why-Cry Ransomware – Overview

Why-Cry is the name of a cryptovirus that demands a ransom to be paid out for allegedly getting your files back. The name of the ransomware is the same as in its payload file “WhyCry-Ransomware.exe”. English speaking users are the main target for the virus, although, people who are from the rest of the World could be affected as well. While your files are being encrypted, the following fake Windows Update screen will show up (while your screen is locked):

That screen is clever as it looks like a legitimate Windows update, while locking you away from your computer, making it for the screen impossible to be changed.

Why-Cry ransomware could make entries in the Windows Registry to achieve persistence, and probably launch or repress processes in a Windows environment. Such entries are typically designed in a way to launch the virus automatically with each start of the Windows operating system.

The ransom message is written in English. You can preview that ransom message, which loads after the encryption process is done, from the below image:

That ransom message reads the following:

Attention!!!
All Your Files are Encrypted by Why-Cry

Warning: Do not turn off your Computer!! You will loose all your files!
If you want to Decrypt your files follow these simple steps:

1.) Create BitcoinWalIet here: https://blockchain.info/
2.) Buy Bitcoins worth of $300.
3.) Send $300 in Bitcoin to Given Address Below!
4.) You will get your Decryption Key after you pay $300 in Bitcoin.
5.) The Decryption Key will pop up on the left side automatically. We are more advance than others.
6.) Enter it in Given Box and Click on Decrypt.
7.) Afler clicking on Decrypt the files will start decrypting in background.
8.) BitCoin Address: 15Yqjc6aa1voMNGSqDnaYkdFwW7yHEYWtC ve itself.
9.) You will get all of your files safely.
Enter Decryption Key Here:
Decrypt

lf your files don’t get decrypted!!!
Than you have not paid successfully!!!

All files have been Encrypted by Why-Cry!
Don‘t close the PC otherwise,
I wont be responsible if your files dont decrypt.
If you close your PC this screen will be removed.
And you will not be able to Decrypt files back.

The note of the Why-Cry ransomware states that your files are encrypted. A warning is given, that upon turning off your computer machine, all your files will be lost irrevocably. Even if that is true, do not worry as the ransomware seems to be decryptable. You should NOT pay up or contact the cybercriminals. Your files may not get restored upon payment and you have no guarantee of that working. Moreover, giving money to those criminals will likely motivate them to create more ransomware or commit similar crimes.

Why-Cry Ransomware – Encryption

For the moment, it is unknown as to what algorithm the Why-Cry cryptovirus uses for its encryption process. You can see a list with file extensions that the Why-Cry ransomware probably seeks to encrypt:

→.7z, .bmp, .doc, .docm, .docx, .html, .jpeg, .jpg, .mp3, .mp4, .pdf, .php, .ppt, .pptx, .rar, .rtf, .sql, .tiff, .txt, .xls, .xlsx, .zip

Those files are the most commonly-used ones for most Windows users, which is why the list could be on-point. The extension which the Why-Cry virus appends to encrypted files is .whycry as a secondary extension, without changing the original one, and keeping the file name intact.

To remove the lock on your screen and get the ransom message window down, all you have to do is type the following Password code:

YANGTGTDKYFWSBDAUWPMFNHBUGPFUCKYOUBITCH

Beware, as there is a small possibility of your files getting broken, if you enter the code wrong.

The Why-Cry cryptovirus could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

In case the command stated above is executed that would make the encryption process more efficient as it will eliminate one of the ways for restoring your files. If your computer was infected with this ransomware and your files are locked, read on through to find out how you could potentially recover your files.

Remove Why-Cry Ransomware and Restore .whycry Files

If your computer got infected with the Why-Cry ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Avatar

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...