Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

TeslaCrypt (.VVV, .CCC, .EXX, .EZZ, .ECC, etc) Decryption Support Requests


  • Please log in to reply
5748 replies to this topic

#5746 metalgear

metalgear

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:15 AM

Posted 09 August 2018 - 09:59 PM

Good morning. I have the .vvv files encrypted with TeslaDecoder I miss the key I made TeslaViewer of the file gave me this result. There is someone who can help me thanks.

 

================
= PrivateKeyBC =
================

SharedSecret1*PrivateKeyBC
hex 4121D0A0301C1CC392A03B971D0481755120FF668D126C4369A2B596ED056E213C0FAEC42C8BB0AA60D093CE50D75CCDE9F5949CBC864D10E2211FED33503BE2
dec 3411244327274015574121583181923768245209686812380449022477758995786461441614828555217066595974949958492623669564039417790447559684338497735593666234301410



PrivateKeyBC =
PublicKeyBC = 04DE1B49A631E10E8951D024CF30E3EC9B6AB8E69C5B595C25441E5ACFCBAADAC393AB799F60306807BE5D44CCDAB9E87142D62D64AC3349DFDFDA9EF7899665EF




==================
= PrivateKeyFile =
==================

SharedSecret2*PrivateKeyFile
hex 2E6EA23B413BCCDA85F14D12CADE6A812083A6BA1072C51AC3DE8A2F81692F0EEEA58BBACDCB6576D1F98E2D1ACBFE24DC4BA2F25394A600F8F40F94BE965275
dec 2431849697975369562325241618174018273718886856225728377996256087612225748575714117997122973190131835737571573904882462684864256425983352093618108466877045



PrivateKeyFile =
PublicKeyFile = 04538BA403D478DD30A0AF41EF7B88708AD188F27EF38953828FE81EEFE404E7B563398158E27AA903EB4B08A249DDC99A515029379B651C2D952C56BDE77436FF





 



BC AdBot (Login to Remove)

 


#5747 thyrex

thyrex

  • Members
  • 573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belarus
  • Local time:02:15 AM

Posted 09 August 2018 - 10:55 PM

@metalgear

 

I took your case


Microsoft MVP 2012-2016 Consumer Security

Microsoft Reconnect 2016


#5748 metalgear

metalgear

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:15 AM

Posted 10 August 2018 - 05:21 PM

@metalgear

 

I took your case

 

thanks



#5749 thyrex

thyrex

  • Members
  • 573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belarus
  • Local time:02:15 AM

Posted 11 August 2018 - 11:36 PM

@metalgear

Your PrivateKeyBC is 75415D82A2837B8654F86F41748E1B682A2DC36D0DE02BEE3F093BEA3B14FC16

+ all factors http://factordb.com/index.php?id=1100000000876368977


Microsoft MVP 2012-2016 Consumer Security

Microsoft Reconnect 2016





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users