Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

TeslaCrypt (.VVV, .CCC, .EXX, .EZZ, .ECC, etc) Decryption Support Requests


  • Please log in to reply
5676 replies to this topic

#5671 powermax

powermax

  • Members
  • 67 posts
  • OFFLINE
  •  
  • Local time:08:16 AM

Posted 10 May 2018 - 05:26 AM

 

can some one please help me with this file

My files have a .exx extension.

 

================
= PrivateKeyBC =
================

SharedSecret1*PrivateKeyBC
hex 1658A05F77B363F3CFDCC9673412FFD0601E68C39A6604D18D99EE3090F3E12B788F500860E53D1FE749CDB2DFD55B002A303EC6A979845F26900B7462A02C85
dec 1170365307169274346861071881904114980748536598974216066859095172414902060996651300692228994409062926270041979359010194467327316068949767897410175137492101



PrivateKeyBC =
PublicKeyBC = A3C475099A2AC5BC6CF66353400541C824E56C2FF57B1097245A9670FCD6F9CB
 

here is a more complicated key. C116,

I stopped the calculation here.

wait, someone else will help you get a private key.

 

 

Thank you very mutch friend !!! I have now all my data back. Thank you again :clapping: :clapping: :clapping: :lmao: :lmao: :lmao:



BC AdBot (Login to Remove)

 


#5672 powermax

powermax

  • Members
  • 67 posts
  • OFFLINE
  •  
  • Local time:08:16 AM

Posted 10 May 2018 - 05:30 AM

Last post from Demonslay335 wa correct.

 

Private Key is : 783D678BE564029A000DB73BEA2FEC0B6EEC1BFE1D33D0CC67FF60CBE5EB5D2C

 

Thank you to all.



#5673 al1963

al1963

  • Members
  • 886 posts
  • OFFLINE
  •  
  • Local time:12:16 PM

Posted 10 May 2018 - 05:40 AM

@al1963

 

Not necessarily wrong, that header structure is correct. It seems like there were some cross-over variants in between I think. I honestly just always chuck the file into TeslaViewer and see if it accepts it either way. In this case it provided the two pieces we need to factor the key as usual. :)

 

@powermax

 

Here is your PrivateKeyBC.

 

783D678BE564029A000DB73BEA2FEC0B6EEC1BFE1D33D0CC67FF60CBE5EB5D2C

@Demonslay335,

 

there is such a proverb: one head is good, and three is better. :).
I apparently misled the thyrex with my previous post.

here:

https://www.bleepingcomputer.com/forums/t/677148/problem-with-file-crypt-with-exx-extension/

 

Affects the lack of consistent practice.
But thanks to your useful habit - to check everything in Teslaviewer, this error has been corrected. :).


Edited by al1963, 10 May 2018 - 05:44 AM.


#5674 Edge_43

Edge_43

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:16 AM

Posted 18 May 2018 - 01:17 PM

Hello.

Can anybody help me?

 

A friend asked me to help him with this ransomware, but I have not got it. I stayed in the factorization, and my laptop does not have enough computing power (i5 4210U).

 

If someone can help, I appreciate it very much :thumbsup:

 

================
= PrivateKeyBC =
================

SharedSecret1*PrivateKeyBC
hex 45F1483F51C64B310A666310E6BDDC476A83ED7ECCDDAF95ABA7DAA89C397C01C9A6500FB96F5DAA67D1B3031241CC9890F5D4AD9A66D7FE60CF6F42F7B57160
dec 3663186414885400651206322064430619817264861391047930155514584450372918500264678679299188706198763517208690367065879621098299198167736163277193629293441376



PrivateKeyBC =
PublicKeyBC = 52EC305CABA6A938BF5DC382A96463FA8AA1DA3E7B7F160D70F02A51B5232EDE

Sample file: https://www.sendspace.com/file/d48rj1



#5675 thyrex

thyrex

  • Members
  • 534 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belarus
  • Local time:09:16 AM

Posted 18 May 2018 - 01:35 PM

I took your case

Microsoft MVP 2012-2016 Consumer Security

Microsoft Reconnect 2016


#5676 thyrex

thyrex

  • Members
  • 534 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belarus
  • Local time:09:16 AM

Posted 18 May 2018 - 04:49 PM

@Edge_43

Your PrivateKeyBC is 6FB240D7CFDE061D3CCF6791436010E680330F96D7D2868670DA4B70B2C3D760

+ all factors http://factordb.com/index.php?id=1100000001135936705


Microsoft MVP 2012-2016 Consumer Security

Microsoft Reconnect 2016


#5677 Edge_43

Edge_43

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:16 AM

Posted 19 May 2018 - 01:03 AM

@thyrex, you've been fast!
When I get home, I try the decoding.
Thank you very much!!!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users