Try2Cry Ransomware is a rather peculiar ransomware infection that can give you a decent fright. It can sure encrypt your files, but there is no need to panic because it should be possible to decrypt all the affected data without too much difficulty. You can also remove Try2Cry Ransomware following the manual removal instructions that you will find at the bottom of this description. Should you have more questions about this type of infection or how you could protect your system from them, do not hesitate to leave us a comment down below.
Based on our research, this infection should be related to the open-source infection Stupid Ransomware. When we encounter an open-source infection, it means that the basic code for the program is available for free, and anyone can use it to create their own programs. It can be rather annoying because a lot of malicious programs could be created virtually for free. On the other hand, our researchers say that the files encrypted by Try2Cry Ransomware should be decrypted by a public decryption tool. Therefore, maybe there is light at the end of this tunnel. The most important thing is not to panic.
However, just because it might be easier to restore the files affected by this intruder, it doesn’t mean that you should forgo all the precaution measures that would otherwise help you avoid ransomware infection. First, you should realize that ransomware programs employ multiple ways to spread around. First, they can come through spam email attachments. The attachments can look like legitimate documents that you need to check out immediately. Also, Try2Cry Ransomware might spread through unsafe RDP client connections. What’s more, our research specialists maintain that some samples of this infection have the ability to spread via USB flash drives. Thus, it means that you have to be careful about where you plug your flash drives. If it’s a public or a shared computer, there is a bigger chance to get infected (not only with this ransomware program, but a Trojan infection in general).
To mitigate the potential damage of a ransomware infection, you should also consider creating a file backup. A file backup is an external hard drive or a cloud drive where you can store copies of your files. This way, if you get infected by a ransomware program that doesn’t have a public decryption tool, you will still have your files intact.
Try2Cry Ransomware works more or less like most of the other infections from this category. It employs the Rijndael algorithm for the encryption and then requires you to pay a ransom fee when all the files have been locked. Needless to say, paying the ransom is not an option, especially when you can decrypt the files. (You might not even need the decryption tool if you already have a file backup.) And when you have all your files intact, you can focus on removing Try2Cry Ransomware from your system.
The manual removal for this infection isn’t too complicated. This program seems to drop just the main EXE file in the Startup directory. On the other hand, there might be several versions of the same infection, and the dropped files could differ. Therefore, you should consider scanning your system with the SpyHunter free scanner. A full system scan will help you locate all the malicious files, and you will be able to remove them automatically.
After that, consider educating yourself about ransomware and its distribution patterns to avoid similar problems in the future. Also, investing in a powerful antispyware tool would help you protect your system from a number of threats.