What is TeslaCrypt
TeslaCrypt is very dangerous encrypting virus and ransomware. It uses AES encryption to encrypt sensitive user files (documents, photos, music, video). After this it asks for a ransom to decrypt those files. One of the features of TeslaCrypt ransomware is that it also affects gaming files of most popular games (MineCraft, StarCraft, World of Tanks, World of Warcraft). TeslaCrypt modifies encrypted files extension to one of this:
.ecc, .ezz, .exx, .xyz, .zzz, .aaa, .abc, .ccc
It will also modify desktop background to the picture with written instructions to pay the ransom and decrypt the files. TeslaCrypt will also create text file with the same instructions (HELP_TO_DECRYPT_YOUR_FILES.txt). Ransom amount is about $500. Do not try to pay the ransom as you put your bank details at risk! Instead use step-by-step guide below to remove TeslaCrypt and decrypt .ecc (.zzz and other) files and restore your data.
How TeslaCrypt infected your PC
TeslaCrypt uses spam e-mails as well as other ransomware. Spam e-mails may look like this:
Spam e-mails have .doc or .xls files attached to them, those files have built-in malicious macros that will download and run core virus file. This file will start encryption of user files. The only chance to prevent it is to have up-to-date antivirus installed or use software for crypto protection. We will give you links and description of such software in the bottom of the article. File types targeted by TeslaCrypt:
.7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .sc2save, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mcgame, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .001, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .DayZProfile, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, .unity3d, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbfv, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt
Download TeslaCrypt Removal Tool
To remove TeslaCrypt completely we recommend you to use SpyHunter 5. It detects and removes all files, folders and registry keys of TeslaCrypt.
Alternative remover
As a good free alternative to remove TeslaCrypt use Malwarebytes Anti-Malware. It will detect core files and processes of TeslaCrypt ransomware and eliminate them to allow you start decryption of your files.
How to remove TeslaCrypt manually
It is not recommended to remove TeslaCrypt manually, for safer solution use Removal Tools instead.
TeslaCrypt files:
%AppData%\{randomname}.exe
%AppData%\key.dat
%AppData%\log.html
%LocalAppData%\{randomname}.exe
%LocalAppData%\storage.bin
%LocalAppData%\log.html
%Desktop%\Save_Files.lnk
%Desktop%\CryptoLocker.lnk
%Desktop%\HELP_TO_DECRYPT_YOUR_FILES.bmp
%Desktop%\HELP_TO_DECRYPT_YOUR_FILES.txt
%Desktop%\HELP_TO_SAVE_FILES.txt
%Desktop%\HELP_TO_SAVE_FILES.bmp
%Documents%\RECOVERY_FILE.TXT
%Desktop%\HELP_RESTORE_FILES.bmp
%Desktop%\HELP_RESTORE_FILES.txt
HELP_RESTORE_FILES_{randomname}.TXT
TeslaCrypt reg keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AVSvc "%AppData%\{randomname}.exe"
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\crypto13 "%AppData%\{randomname}.exe"
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AVrSvc "%LocalAppData%\{randomname}.exe"
HKCU\Control Panel\Desktop\Wallpaper "%Desktop%\HELP_RESTORE_FILES.bmp"
HKCU\Control Panel\Desktop\Wallpaper "%Desktop%\HELP_TO_DECRYPT_YOUR_FILES.bmp"
HKCU\Control Panel\Desktop\Wallpaper "%Desktop%\HELP_TO_SAVE_FILES.bmp"
How to decrypt and restore .ecc files
Use automatic decryptors
Option 1: Use free decryption tool for .ecc, .exx, and .ezz files called TeslaDecoder. It is rather easy to use. Extract zip archive and load data files (storage.bin, key.dat). Tool can find them automatically or user can show the path to them in Windows Registry. Download it here:
Option 2: Use another free decryption tool from Cisco Talos Group called Talos TeslaCrypt Decryption Tool. It can also help you to decrypt files with .ecc, .vvv, .zzz, .ttt , .micro or .xxx extensions. To use this tool, copy the “key.dat” file from Application Data directory to the tool’s directory and specify encrypted file or directory containing encrypted files. read more about using this tool here. Download it here:
Option 3: Use free decryptor from Trend Micro called TrendMicro TeslacryptDecryptor. It can decrypt files encrypted by all versions of TeslaCrypt ransomware.
- TeslaCrypt V1 – {original file name}.ECC
- TeslaCrypt V2 – {original file name}.VVV, CCC, ZZZ, AAA, ABC, XYZ
- TeslaCrypt V3 – {original file name}.XXX or TTT or MP3 or MICRO
- TeslaCrypt V4
Download it here:
There is no purpose to pay the ransom, because there is no guarantee you will receive the key, but you will put your bank credentials at risk.
If you are infected with TeslaCrypt ransomware and removed it from your computer you can try to decrypt your files manually. Antivirus vendors and individuals create free decryptors for some cryptolockers. To attempt to remove them you can do the following:
Using Windows Previous Versions option:
- Right-click on infected file and choose Properties.
- Select Previous Versions tab.
- Choose particular version of the file and click Copy.
- To restore the selected file and replace the existing one, click on the Restore button.
- In case there is no items in the list choose alternative method.
Using Shadow Explorer:
- Download Shadow Explorer program.
- Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
- Select the drive and date that you want to restore from.
- Right-click on a folder name and select Export.
- In case there are no other dates in the list, choose alternative method.
If you are using Dropbox:
- Login to the DropBox website and go to the folder that contains encrypted files.
- Right-click on the encrypted file and select Previous Versions.
- Select the version of the file you wish to restore and click on the Restore button.
How to protect computer from viruses like TeslaCrypt in future
Use Malwarebytes Anti-Ransomware Beta
Famous anti-malware vendor Malwarebytes along with EasySync Solutions created tool that will help you with active anti-ransomware protection as additional shield to your current protection.
Use HitmanPro.Alert with CryptoGuard
Dutch vendor of legendary cloud-based scanner HitmanPro – Surfright released active antivirus solution HitmanPro.Alert with CryptoGuard feature that effectively protects from latest versions of cryptoviruses.