Kestukas

Member
  • Content Count

    6
  • Joined

  • Last visited

Community Reputation

1 Neutral

About Kestukas

  • Rank
    New Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. yeah, my is exactly same encrypotion with same ending, when i logged in tor network on my id it said nemesis encryption id_2809157423_fgb45ft3pqamyji7.onion
  2. yes, seems it is hard to decrypt this one, as at start i wanted to look for encryption because thys encryption virus crypting only 36bytes of file, so other parts of files is recoverable, and posted info how people can try recovering data if they have large files, but EMSI denied my post saying this is harmfull , and need to wait for emsisoft to make an decryptos , so we wait now :)) because i have no will to do it myself , while i get punch in a head trying to help.
  3. share your mathlab file here, we can try look into it
  4. Hello forum, i can confirm that cry36 is not so harmfull as few ransomware before, if your files is super important, it can be fixed by having some knowlage, remove some bytes form back of file, and try to use 10kb of file in start of file (can confirm that it encrypt only 10kb of file in start) so basically if your data files is databases ,some big xls/doc , Theorically its possible to recreate it by using analogues p.s. need more analysis but seems first and last lines of encrypted files is same (so easy to determinate encryption type)
  5. Seems best is to wait than.... hard really to learn all cryptography