JimmyJAPA

Member
  • Content Count

    24
  • Joined

  • Last visited

  • Days Won

    2

JimmyJAPA last won the day on June 2 2017

JimmyJAPA had the most liked content!

Community Reputation

3 Neutral

About JimmyJAPA

  • Rank
    Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Hello, Geng, I am aware of the possibility and I scanned the decryptor immediately after downloading it, using Microsoft Security Essentials. There was no virus in it. I checked it again just now since you asked. Still no virus. My system is always clean after every reboot. For your reference. I am not quite sure about your question, sorry. Could you elaborate?
  2. Of course I am willing to do my part to relieve all the other victims of suffering, especially I have two sets of keys to Cry36. However, I don't know how and what to do. I also wrote a lot to them to dissuade them from doing this after I decrypted almost all my files.
  3. Dear all, I had no choice but to pay the ransom for Cry36 yesterday and got almost all my files back. The negotiation was long and tiring, and the payment was made via BitCoin. I paid twice, for I was infected twice. Just for your reference. Thanks for all your attention and time. Case closed. Sincerely, [email protected]
  4. Dear all, I had no choice but to pay the ransom for cry36 yesterday and got almost all my files back. The negotiation was long and tiring, and the payment was made via BitCoin. I paid twice, for I was infected twice. Just for your reference. Thanks for all your attention and time. Case closed. Sincerely, [email protected]
  5. OMG! Today I use Tor to connect to http://gebdp3k7bolalnd4.onion to check out information. It was shutdown and said, "This resource more is not available. You can find out the details decrypting files / buy decryptor + key / ask questions in the chat: https://fgb45ft3pqamyji7.onion.to, https://fgb45ft3pqamyji7.onion.cab (not need Tor) http://fgb45ft3pqamyji7.onion (need Tor)" It means the resource is gone? What should I do???!!! Q___Q
  6. @nicksoti I am so sorry to hear your story, really. I also fell victim to a ransomware, Cry36, which locked all the files and photos that I have collected for more than 20 years, and I still can't decrypt it. How would they feel if they see our stories, and other thousands of hundreds'? I really curse these people who did this to all the victims! Rot in hell!!! BTW, if you re-install your system, be sure to patch the security leaks lest you should get infected again. (I was infected twice.) https://www.catalog.update.microsoft.com/Search.aspx?q=KB4019264
  7. Here I am again. After keeping searching on the Net, I finally found a ransom-paying photo. Just for your reference. BTW, could you please tell me if this Cry36 can be decrypted or not, Sarah or other staff? If yes, are you currently working on Cry36 or other ransomwares? If not, I still much appreciate your efforts as well as time devoted to this, and please tell me ASAP so that I can take time to accept it. Thanks a lot!
  8. The price of 1 BitCoins has risen to almost $2000... Q_Q
  9. I am also still waiting for Cry36... Any good news? Q_Q
  10. This webpage contains the step-by-step procedure of paying the ransom. Also for your reference. http://www.techbang.com/posts/51240-blackmailing-virus-writers-have-been-practically-tell-you-whether-to-pay-the-ransom-the-network-has-emerged-black-black-hijacked-the-ransom-victim
  11. Dear McLaugb, This is Jimmy, another victim of the ransomware virus, gebdp3k7bolalnd4.onion. I saw the following sentence from you, and I am wondering if you have the e-mail address with which I can contact the kidnapper? "The criminals also have a support box for you to send them files and your email address if the decrypt does not work for you." Your reply, either public or private, would be most appreciated. Thank you! Sincerely, Jimmy
  12. @kygiacomo As I mentioned before, I use Win7 with a real IP connection, and the details are in my post on May 11, which is on the above. Also, I didn't have the system updates after 2016.06. So, I guess that the reason why I got infected was that I directly connected to the Internet with a real IP. The other computers of mine using virtual IPs didn't get the virus. Just for your reference.
  13. @kygiacomo @bruticus0 Hey men, I don't think the data recovery company would help, but thanks, aka Plan Y. Besides, I am prepared to pay the ransom twice, if necessary and if the first time succeeds. Of course I will do some surveys before doing so, and it will be my last resort, aka Plan Z. There are a few webpages that describe the process of transaction in detail, and I would peruse them a bunch of times to make sure everything goes right. Still looking everywhere for a solution. Wish me luck! Let's give the guys working on this some cheers! Sincerely, Jimmy
  14. @bruticus0 Hello! Thanks for reminding me. I check the related threads almost every day, hoping to get the latest information. Well, I tried the solution at the beginning of the infection, but data recovery is of no use for me, for I regularly defragment my hard disk to keep it clean. I will just wait for a little longer for the geniuses in Emsisoft to see if they can come up with something. If anything good happens, I would definitely donate to them for appreciation. Finally, the IC3 forms are too complicated to me, a non-American, but I would consider filling in them someday. Thanks for everything! Sincerely, Jimmy from Taiwan