{"id":1409,"date":"2016-05-19T10:33:03","date_gmt":"2016-05-19T08:33:03","guid":{"rendered":"https:\/\/www.nullalo.com\/?p=1409"},"modified":"2025-10-22T10:15:48","modified_gmt":"2025-10-22T08:15:48","slug":"teslacrypt-to-restore-encrypted-files","status":"publish","type":"post","link":"https:\/\/www.nullalo.com\/en\/teslacrypt-how-to-restore-encrypted-files\/","title":{"rendered":"TeslaCrypt: how to restore encrypted files"},"content":{"rendered":"<p><\/p>\n<p style=\"text-align: justify;\">For the uninitiated, a <strong>ransomware<\/strong> is a type of malware (malicious software &#8211; a computer virus) that requires a ransom\u00a0to be paid to remove the limitation of access to the infected system. The most common forms of ransomware encrypt user files, asking to pay, often amounts\u00a0in the order of a thousand dollars, to restore those files.<\/p>\n<p style=\"text-align: justify;\">Infected files encryption is usually based on the principle of RSA encryption with <strong>public\/private keypair<\/strong>: the public key is released to the victim, with the promise of getting the private one, needed\u00a0to restore files, from the maker of the ransomware\u00a0(which is the only one to know it).<\/p>\n<p style=\"text-align: justify;\">The used encoding&#8217;s high number of bits (eg. 1024) makes it often impossible to <strong>self-recover the private key<\/strong> using distributed systems, where a series of computers attempt\u00a0to identify this key starting from the public and an infected file used as sample.<\/p>\n<p style=\"text-align: justify;\">Moreover, the payment is made via <strong>bitcoins<\/strong> and is therefore not traceable (because a peer-to-peer transaction with the beneficiary without intermediaries happens), so there is no guarantee of the fact that, in return for payment, the maker\u00a0the ransomware will honor the\u00a0promise to allow you to recover your files.<\/p>\n<p>Some <strong>preventive recommendations<\/strong> to avoid entering into such a situation are:<\/p>\n<ul>\n<li>always make a <strong>backup<\/strong> of your data on another device (preferably remotely)<\/li>\n<li>use a good <strong>antivirus<\/strong> (Kaspersky, ESET, etc &#8230;) and keep it up to date, purchasing a license where necessary<\/li>\n<li>avoid opening files from <strong>unknown sources<\/strong> (suspicious email senders and\/or text, untrusted\u00a0web sites, etc&#8230;)<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong>TeslaCrypt<\/strong> is one of ransomware that in the last\u00a0months has claimed more victims: distributed in many variations, can be recognized from the image shown\u00a0to\u00a0the user once the files infected (which is the one shown as main picture\u00a0in\u00a0this article), and for the extensions given\u00a0to infected files, some of which are:<\/p>\n<ul>\n<li>.encrypted<\/li>\n<li>.ecc<\/li>\n<li>.ezz<\/li>\n<li>.exx<\/li>\n<li><strong>.xxx<\/strong><\/li>\n<li><strong>.ttt<\/strong><\/li>\n<li><strong>.micro<\/strong><\/li>\n<li><strong>.mp3<\/strong><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">For several months, in particular <strong>for the last 4 extensions<\/strong>, there was no\u00a0solution, except\u00a0asking for &#8220;computational&#8221; help on some <strong>support forum<\/strong>, in which different users offer their computers to\u00a0identify the private key that decode your files.<\/p>\n<p style=\"text-align: justify;\">Starting today, however, thanks to user support known as BloodDolly, <strong>you can decrypt files with one of these four extensions<\/strong> using a software called <strong>TeslaDecoder<\/strong>, which can be downloaded here:<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"http:\/\/download.bleepingcomputer.com\/BloodDolly\/TeslaDecoder.zip\">TeslaDecoder v1.0.0<\/a><\/strong><\/p>\n<p>Beyond all the\u00a0features included, let&#8217;s see how to\u00a0<strong>decode a .xxx, .ttt, .micro or .mp3 infected file<\/strong> with this software.<\/p>\n<p>Once extracted\u00a0the downloaded .zip file into a folder, you must execute\u00a0<strong>TeslaDecoder.exe<\/strong>.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1413\" src=\"\/wp-content\/uploads\/2016\/05\/teslacrypt_02.png\" alt=\"teslacrypt_02\" width=\"714\" height=\"441\" srcset=\"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_02.png 714w, https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_02-300x185.png 300w, https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_02-360x222.png 360w\" sizes=\"auto, (max-width: 714px) 100vw, 714px\" \/><\/p>\n<p style=\"text-align: justify;\">Now,\u00a0click on &#8220;<strong>Set key<\/strong>&#8221; and, under &#8220;<strong>Extension<\/strong>&#8220;, select &#8220;<strong>.xxx, .ttt, .micro, .mp3<\/strong>&#8221; from the dropdown list.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1414\" src=\"\/wp-content\/uploads\/2016\/05\/teslacrypt_03.png\" alt=\"teslacrypt_03\" width=\"519\" height=\"328\" srcset=\"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_03.png 519w, https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_03-300x190.png 300w, https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_03-360x228.png 360w\" sizes=\"auto, (max-width: 519px) 100vw, 519px\" \/><\/p>\n<p>Finally, click on &#8220;<strong>Set key<\/strong>&#8220;. At this point, in the main screen of the software the following buttons\u00a0will be enabled:<\/p>\n<ul>\n<li><strong>Decrypt folder<\/strong>: restore files located in a specific folder<\/li>\n<li><strong>Decrypt all<\/strong>: restore all infected files on your computer<\/li>\n<li><strong>Decrypt list<\/strong>: restore\u00a0a list of files whose names has been written by you\u00a0in a text file<\/li>\n<\/ul>\n<p>Personally I would use the first one to check\u00a0what is restored, or the second one to avoid\u00a0leaving out some\u00a0file from the restore process.<\/p>\n<p>Once you click on one of these three buttons you will be asked whether, as a result of decryption, you want to <strong>delete the infected file and keep\u00a0only the restored one<\/strong>.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1420\" src=\"\/wp-content\/uploads\/2016\/05\/teslacrypt_04_en.png\" alt=\"teslacrypt_04_en\" width=\"452\" height=\"200\" srcset=\"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_04_en.png 452w, https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_04_en-300x133.png 300w, https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_04_en-360x159.png 360w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/p>\n<p>This is an important\u00a0decision to make, since:<\/p>\n<ul>\n<li>if you decide to <strong>delete the encrypted files<\/strong> by clicking &#8220;<strong>Yes<\/strong>&#8221; and decoding fails for any reason, you have no way to retry<\/li>\n<li>if you decide to <strong>keep the encrypted files<\/strong> by clicking &#8220;<strong>No<\/strong>&#8220;, after checking for their\u00a0correct decoding you will be forced to delete the infected ones manually, and when these files are scattered in different folders operation becomes very tedious and laborious.<\/li>\n<\/ul>\n<p>My personal advice is to try to decode a &#8220;sample&#8221; file without deleting the encrypted version (thus by clicking on &#8220;<strong>No<\/strong>&#8220;), and, once verified the restored file is ok, proceed\u00a0decoding the remaining ones with\u00a0infected versions deletion, by repeating the operation and clicking this time on &#8220;<strong>Yes<\/strong>&#8220;.<\/p>\n<p>Good luck!<\/p>","protected":false},"excerpt":{"rendered":"<p>How to decrypt TeslaCrypt encrypted files with extension .xxx, .ttt, .micro or .mp3 using a software called TeslaDecoder<\/p>\n","protected":false},"author":2,"featured_media":1412,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[14,101],"tags":[110,111,109,103],"class_list":["post-1409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-data-recovery","tag-decode","tag-ransomware","tag-teslacrypt","tag-recupero"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TeslaCrypt: how to restore encrypted files - Nullalo!<\/title>\n<meta name=\"description\" content=\"How to decrypt TeslaCrypt encrypted files with extension .xxx, .ttt, .micro or .mp3 using a software called TeslaDecoder\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nullalo.com\/?p=1409\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TeslaCrypt: how to restore encrypted files - Nullalo!\" \/>\n<meta property=\"og:description\" content=\"How to decrypt TeslaCrypt encrypted files with extension .xxx, .ttt, .micro or .mp3 using a software called TeslaDecoder\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nullalo.com\/?p=1409\" \/>\n<meta property=\"og:site_name\" content=\"Nullalo!\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nullalo\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/fulvio.sicurezza\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-19T08:33:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T08:15:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fulvio Sicurezza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/FulvioSicurezza\" \/>\n<meta name=\"twitter:site\" content=\"@Nullalo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fulvio Sicurezza\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nullalo.com\/?p=1409\",\"url\":\"https:\/\/www.nullalo.com\/?p=1409\",\"name\":\"[:it]TeslaCrypt: come recuperare i files crittografati[:en]TeslaCrypt: how to restore encrypted files[:] - Nullalo!\",\"isPartOf\":{\"@id\":\"https:\/\/www.nullalo.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nullalo.com\/?p=1409#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nullalo.com\/?p=1409#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_01.jpg\",\"datePublished\":\"2016-05-19T08:33:03+00:00\",\"dateModified\":\"2025-10-22T08:15:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.nullalo.com\/#\/schema\/person\/fe9c2885376a6ab076e06461ae1b546c\"},\"description\":\"How to decrypt TeslaCrypt encrypted files with extension .xxx, .ttt, .micro or .mp3 using a software called TeslaDecoder\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nullalo.com\/?p=1409#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nullalo.com\/?p=1409\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nullalo.com\/?p=1409#primaryimage\",\"url\":\"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_01.jpg\",\"contentUrl\":\"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_01.jpg\",\"width\":1140,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nullalo.com\/?p=1409#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nullalo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TeslaCrypt: come recuperare i files crittografati\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nullalo.com\/#website\",\"url\":\"https:\/\/www.nullalo.com\/\",\"name\":\"Nullalo!\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nullalo.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nullalo.com\/#\/schema\/person\/fe9c2885376a6ab076e06461ae1b546c\",\"name\":\"Fulvio Sicurezza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nullalo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.nullalo.com\/wp-content\/uploads\/2015\/02\/Fulvio-Sicurezza_avatar_1424711147-96x96.jpg\",\"contentUrl\":\"https:\/\/www.nullalo.com\/wp-content\/uploads\/2015\/02\/Fulvio-Sicurezza_avatar_1424711147-96x96.jpg\",\"caption\":\"Fulvio Sicurezza\"},\"sameAs\":[\"http:\/\/www.generalservice.na.it\",\"https:\/\/www.facebook.com\/fulvio.sicurezza\",\"http:\/\/it.linkedin.com\/in\/fulviosicurezza\",\"https:\/\/x.com\/https:\/\/twitter.com\/FulvioSicurezza\",\"https:\/\/www.youtube.com\/c\/FulvioSicurezzaIT\"],\"url\":\"https:\/\/www.nullalo.com\/en\/author\/f-sicurezza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TeslaCrypt: how to restore encrypted files - Nullalo!","description":"How to decrypt TeslaCrypt encrypted files with extension .xxx, .ttt, .micro or .mp3 using a software called TeslaDecoder","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nullalo.com\/?p=1409","og_locale":"en_US","og_type":"article","og_title":"TeslaCrypt: how to restore encrypted files - Nullalo!","og_description":"How to decrypt TeslaCrypt encrypted files with extension .xxx, .ttt, .micro or .mp3 using a software called TeslaDecoder","og_url":"https:\/\/www.nullalo.com\/?p=1409","og_site_name":"Nullalo!","article_publisher":"https:\/\/www.facebook.com\/nullalo","article_author":"https:\/\/www.facebook.com\/fulvio.sicurezza","article_published_time":"2016-05-19T08:33:03+00:00","article_modified_time":"2025-10-22T08:15:48+00:00","og_image":[{"width":1140,"height":600,"url":"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_01.jpg","type":"image\/jpeg"}],"author":"Fulvio Sicurezza","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/FulvioSicurezza","twitter_site":"@Nullalo","twitter_misc":{"Written by":"Fulvio Sicurezza","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nullalo.com\/?p=1409","url":"https:\/\/www.nullalo.com\/?p=1409","name":"[:it]TeslaCrypt: come recuperare i files crittografati[:en]TeslaCrypt: how to restore encrypted files[:] - Nullalo!","isPartOf":{"@id":"https:\/\/www.nullalo.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nullalo.com\/?p=1409#primaryimage"},"image":{"@id":"https:\/\/www.nullalo.com\/?p=1409#primaryimage"},"thumbnailUrl":"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_01.jpg","datePublished":"2016-05-19T08:33:03+00:00","dateModified":"2025-10-22T08:15:48+00:00","author":{"@id":"https:\/\/www.nullalo.com\/#\/schema\/person\/fe9c2885376a6ab076e06461ae1b546c"},"description":"How to decrypt TeslaCrypt encrypted files with extension .xxx, .ttt, .micro or .mp3 using a software called TeslaDecoder","breadcrumb":{"@id":"https:\/\/www.nullalo.com\/?p=1409#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nullalo.com\/?p=1409"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nullalo.com\/?p=1409#primaryimage","url":"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_01.jpg","contentUrl":"https:\/\/www.nullalo.com\/wp-content\/uploads\/2016\/05\/teslacrypt_01.jpg","width":1140,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.nullalo.com\/?p=1409#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nullalo.com\/"},{"@type":"ListItem","position":2,"name":"TeslaCrypt: come recuperare i files crittografati"}]},{"@type":"WebSite","@id":"https:\/\/www.nullalo.com\/#website","url":"https:\/\/www.nullalo.com\/","name":"Nullalo!","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nullalo.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.nullalo.com\/#\/schema\/person\/fe9c2885376a6ab076e06461ae1b546c","name":"Fulvio Sicurezza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nullalo.com\/#\/schema\/person\/image\/","url":"https:\/\/www.nullalo.com\/wp-content\/uploads\/2015\/02\/Fulvio-Sicurezza_avatar_1424711147-96x96.jpg","contentUrl":"https:\/\/www.nullalo.com\/wp-content\/uploads\/2015\/02\/Fulvio-Sicurezza_avatar_1424711147-96x96.jpg","caption":"Fulvio Sicurezza"},"sameAs":["http:\/\/www.generalservice.na.it","https:\/\/www.facebook.com\/fulvio.sicurezza","http:\/\/it.linkedin.com\/in\/fulviosicurezza","https:\/\/x.com\/https:\/\/twitter.com\/FulvioSicurezza","https:\/\/www.youtube.com\/c\/FulvioSicurezzaIT"],"url":"https:\/\/www.nullalo.com\/en\/author\/f-sicurezza\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/posts\/1409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/comments?post=1409"}],"version-history":[{"count":1,"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/posts\/1409\/revisions"}],"predecessor-version":[{"id":1937,"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/posts\/1409\/revisions\/1937"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/media\/1412"}],"wp:attachment":[{"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/media?parent=1409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/categories?post=1409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nullalo.com\/en\/wp-json\/wp\/v2\/tags?post=1409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}