Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

.vvv extention


  • This topic is locked This topic is locked
6 replies to this topic

#1 KeithW37

KeithW37

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:08 PM

Posted 21 June 2016 - 09:42 AM

all the files and pics have the .vvv after them and can not get them person wants all her pics but they are encrypted with the .vvv and help i have telsacrypt not sure how to use it



BC AdBot (Login to Remove)

 


#2 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,426 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:08 PM

Posted 21 June 2016 - 09:44 AM

You can follow the instructions in the following support topic that is dedicated to helping victims of TeslaCrypt.

If the instructions seem too daunting for you, you may request help by simply following the instructions to provide an encrypted file through a third-party site such as SendSpace, or the output of TeslaViewer (work.txt). We can help factor your key from there.

 

It would be best to post in that topic so that someone can assist you and your case doesn't get missed.


Edited by Demonslay335, 21 June 2016 - 09:45 AM.

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#3 KeithW37

KeithW37
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:08 PM

Posted 21 June 2016 - 09:47 AM

ok thank you i will give it a try if not i will be back for more hlep



#4 KeithW37

KeithW37
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:08 PM

Posted 21 June 2016 - 10:00 AM

no luck and this folder is 8.77 gbs



#5 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,426 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:08 PM

Posted 21 June 2016 - 10:02 AM

You need to follow the instructions to actually factor a key. If you are relying on the public key that was released, it does not work for the older versions.

 

You may share a file or the work.txt for assistance with factoring the key for your case.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#6 KeithW37

KeithW37
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:08 PM

Posted 21 June 2016 - 10:04 AM

================
= PrivateKeyBC =
================
 
SharedSecret1*PrivateKeyBC
hex F057787CC9E6A1A8F09A77E0B111EE084DC1C7939EC65C0E4F26BDBAF486A520967A1F1B59656387ECCFE99DA8B182976ED46D4FF6C2AEA3D0F3CF790AB90ED8
dec 12587715285425952307725311861042950627839891941188864683136975110507760284278449650957675098090141021889826530272545016298340338980515295624970160144191192
 
 
 
PrivateKeyBC = 
PublicKeyBC = 04B434FDDC4FDCE5583695CE71E359E6D6AA48304FB389C9DB381193A115BAC2CA2CA9CC2AC8D48EA919E07E8E59A5BC5640D67ED1E2FEE4DA3E79C2A5A3A44C1C
 
 
 
 
==================
= PrivateKeyFile =
==================
 
SharedSecret2*PrivateKeyFile
hex 1995902BC91E370B746CF49AFE38C0E056E1DA6B6066AD5551F28288122A54F00AABB26D98A63CFB36DE1B3BDB91302D266F2B361E1978603E96665D4FA204BD
dec 1339954910020735731998182427291520980494940188883896575508823575279088606594537973941101487499745927261999810053747828488278965607527027358000284140963005
 
 
 
PrivateKeyFile = 
PublicKeyFile = 041DFFD28A240AAEC150953E603CC22D482ADA3FF6074B719D6511254C07897ABFA5B6326E54749188D1F47C8C94644F320B96B4D8F344B7FC64E44A167EB23730


#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,933 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:08 PM

Posted 21 June 2016 - 08:23 PM

Rather than have everyone with individual topics, it is best (and more manageable for staff) if you reposted the above information in the proper support topic as noted by Demonslay335....To avoid unnecessary confusion, this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users