Jump to content

NnitehawkK-fb

Member
  • Content Count

    13
  • Joined

  • Last visited

Community Reputation

1 Neutral

About NnitehawkK-fb

  • Rank
    Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. You accepted Rebeatus's request. Mike who sent ya? Rebeatus I look all over to assist people Mike cry36 lost everything dont see getting it back question being how do you know i got hit? i keep my circle small
  2. i get the impression decryption is never gonna happen - i dont care about photos just my wav and mp3 files album masters ectera
  3. https://www.bleepingcomputer.com/forums/t/632389/dharma-ransomware-filenameemaildharmawalletzzzzz-support-topic/page-46#entry4190880
  4. http://borncity.com/win/2017/05/25/wannacry-co-eternalblue-vulnerability-checker-und-crysis-ransomware-decryptor/ anyone wanna try this?
  5. does anyone know the exact name of this variation would it make it easier to search
  6. i retired the system have it sitting waiting for a decyption all the removal stuff does not fully work yet either gotta go dig in your registeray and dump all the onion and wcry entries after running several different removal tools it just simply cam back or tried to and ill never trust that box again anyway- so its in the corner being called bad dog i really needed to update this bussiness interface anyway just been putting it off due to all the automation required for a radio stations switchboard if i had not lost my email i wouldnt even give a crap plus i just did'nt wa
  7. http://sensorstechforum.com/wana-decrypt0r-decrypt-files-for-free/ way out of my skill set
  8. i block 445 in the firewall and peer block now kill drive sharing but i dont use it all that much anyway http://www.backup-utility.com/anti-ransomware/how-to-block-port-445-in-windows-3889.html UPDATE - found wcry exception in my firewal
  9. after removing the virus itself i have a service starting up this happens in a command window after i close the sandboxed service that eats 50% cpu resources C:\WINDOWS\system32>ping 127.0.0.1 -n 10 Pinging 127.0.0.1 with 32 bytes of data: Reply from 127.0.0.1: bytes=32 time=8ms TTL=64 Reply from 127.0.0.1: bytes=32 time<1ms TTL=64 Reply from 127.0.0.1: bytes=32 time<1ms TTL=64 Reply from 127.0.0.1: bytes=32 time<1ms TTL=64 Reply from 127.0.0.1: bytes=32 time<1ms TTL=64 Reply from 127.0.0.1: bytes=32 time<1ms TTL=64 Reply from 127.0.0.1: b
  10. this thing also infected/encrypted all my backups and the ones it didnt went missing even on my local cloud drive i had mapped
×
×
  • Create New...