


zip to a folder on your desktop, (if you can download the file from a clean system and then transfer it via USB, you run less risk of overwriting the key in memory). To run it, download the linked file (above) and extract the. However, it relies on current running memory so once you reboot it will be gone and if you’ve done too much on the system since infection, it’s possible the key won’t be found (because it’s been overwritten by data from other applications using the same memory space). This tool essentially searches the system’s memory for prime numbers and pieces together the encryption key used. In order to use this tool, you first need to download it from here.

The decryptor is only going to work if you haven’t restarted the infected system and you haven’t killed the ransomware process ( should be wnry.exe or wcry.exe) so please don’t restart or kill the process if you want to get those files back! Usage So if you’ve got a WannaCry infection on one of the above operating systems, there is hope! IMPORTANT: There is a catch though, it only works for the following operating systems: We just wanted to shoot out a quick blog post to let you know about a decryptor (Wanakiwi) that has been developed for WannaCry/WannaCrypt/wCrypt.
