If the tool can't find WannaCry, it may be possible to manually identify the offending process by opening the Task Manager.
Just over a week ago thousands of computers around the world were infected by the ransomware WannaCry or WannaCrypt, able to hijack the files of up to 220,000 computers from large companies asking for an economic rescue in exchange for free their data. The Windows XP count, on the other hand, was "insignificant", the researchers said.
The newly created software in fact tries to recover the prime numbers of the RSA private key which is used by the WannaCry.
However, Guinet found out that WannaCry "does not erase the prime numbers from memory before freeing the associated memory". As per a NDTV report, WannaCry was stopped in its tracks by a British researcher, but it did infect almost 2 lakh computers worldwide.
"For systems that have been attacked, tools have been developed to unlock the files locked by this ransomware - the WannaDecrpyt or Wannakey".
What Kaspersky's findings also show is the importance of keeping your operating system fully patched and up to date - Microsoft pushed out a fix for WannaCrypt to Windows 7 users back in March. Delpy added that so far, banking, energy and some government intelligence agencies from several European countries and India had contacted him regarding the fix.
An employee of French carmaker Renault walks into the Renault George-Besse factory of Douai on Monday, where production has been stopped since Renault was hit by the global cyberattack effecting more than 150 countries.
"The infection wave is far from being over", he wrote.
The statistic seems now obvious as well considering how incredibly popular Windows 7 is especially among corporate organizations.
Some experts said the attack might have been built to exploit a weakness in Microsoft systems that had been identified by the NSA and given the name EternalBlue.
Earlier this year, Microsoft announced that it will continue to support Windows 7 until 2020, however, Markus Nitschke, Head of Windows at Microsoft Germany previously warned users, particularly business owners, of the dangers of using the operating system. "The code is capable of targeting vulnerable machine by IP address and attempting exploitation via SMB port 445".