20151225, 18:05  #12  
I moo ablest echo power!
May 2013
3474_{8} Posts 
Quote:
Also, good to know about YAFU. I'm not sure I've ever let it run all the way through an NFS job. Quote:
If we wanted to add the dollar donation, maybe it could be toward the forum's fund? 

20151225, 18:26  #13  
Aug 2002
8,563 Posts 
Quote:
How about: http://www.mersenne.org/donate/ https://supporters.eff.org/donate http://oeisf.org/ 

20151227, 02:12  #14 
Dec 2015
1_{10} Posts 
Thank you
I registered just to thank you guys, especially Googulator (not sure if he visits this forum) and wombatman for the help with resolving this issue.
My laptop woke up from sleep by itself during the night, and I woke up with all my files locked. I have no idea how I got infected; I have never used an antivirus, but I'm alert about the files I open and I had never been infected with a virus before. I have absolutely no programming knowledge, had never used python scripts or encryption keys, etc., but the information I found here and from Googulator's tools were enough to figure out how to decrypt everything after several failed attempts. I, of course, shared my factorizations to factordb.com, hoping it can help others. I recovered 3 partitions and 2 external HDDs (close to 6 TB of data). Thank you so much!! 
20151228, 14:33  #15  
Dec 2015
2^{2} Posts 
anyone knows for what reason after some working , script is always searching for something
"c:/ggnfs/gnfslasieve4I13e_argfix.exe"? Quote:
Last fiddled with by conan981 on 20151228 at 14:38 

20151228, 14:53  #16 
I moo ablest echo power!
May 2013
2^{2}·463 Posts 
Try putting the executables attached here into the same folder and see if that fixes the problem.

20151231, 01:41  #17  
I moo ablest echo power!
May 2013
2^{2}·463 Posts 
Quote:


20160102, 13:09  #18 
Jan 2016
2×5 Posts 
is anyone know this error ?
Msieve v. 1.52 (SVN unknown) Thu Dec 31 19:22:34 2015 random seeds: 6e585bc0 ad104d1e factoring 619838370694573489677615657761314429981701046554484927594725478425232273862780267750658149 2406890270674 (153 digits) searching for 15digit factors P1 stage 2 factor found searching for 20digit factors searching for 25digit factors 200 of 214 curves completed 214 ECM curves searching for 30digit factors 425 of 430 curves completed 430 ECM curves searching for 35digit factors 903 of 904 curves completed 904 ECM curves searching for 40digit factors ECM stage 1 factor found commencing quadratic sieve (106digit input) using multiplier of 21 using VC8 32kb sieve core sieve interval: 41 blocks of size 32768 processing polynomials in batches of 5 using a sieve bound of 4509961 (158667 primes) using large prime bound of 676494150 (29 bits) using double large prime bound of 7842874720045650 (4553 bits) using trial factoring cutoff of 53 bits polynomial 'A' values have 14 factors restarting with 2268 full and 136950 partial relations sieving in progress (press CtrlC to pause) 159024 relations (37823 full + 121201 combined from 2341028 partial), need 158763 159024 relations (37823 full + 121201 combined from 2341028 partial), need 158763 sieving complete, commencing postprocessing failed to reallocate 1000643456 bytes thks 
20160104, 01:06  #19 
Jan 2016
4_{16} Posts 
Hi could you help me?
I have tried to factorize number and all this stuff but i don't know if i'm doing correctly.
1º Collect an encrypted file from the attacked machine. Choose a file with a known initial magic number  unfactor.py is preconfigured for working with PDF files; change the magic number in unfactor.py from '%PDF' to the correct value if you are not using a PDF (e.g. 'PK' for .zip, ODF or .docx/OOXML files; '\xff\xd8' for JPEGs; or '\xd0\xcf\x11\xe0' for MS Office .doc files). Done my files is: https://drive.google.com/file/d/0Bwv...ew?usp=sharing now I have used teslacrack C:\Python27>python teslacrack.py Cannot decrypt ./PRENSA2.pdf.vvv, unknown key Cannot decrypt ./PRENSA3.pdf.vvv, unknown key Software has encountered the following unknown AES keys, please crack them first using msieve: 10ACCB6406EB1FE0D93DCC2C5BBDACD8710A04DEB15520EEF1D4CFEDC2DFCA3895943154618918FE 62DA23B722D5809C7AE170584FA8BE30267C1FAF516A5D40 found in ./PRENSA2.pdf.vvv Alternatively, you can crack the following Bitcoin key(s) using msieve, and use them with TeslaDecoder: 5A418C2F6DD510539255FDDFF6EA230CCBA15B0D044B400BFEBE9DE5B1D663F645BF81EEAFC8A519 36947065D4DAACFB5EA0B7BC1B5ED6B17002C95DF69121A1 found in ./PRENSA2.pdf.vvv 3º converted number to decimal 10ACCB6406EB1FE0D93DCC2C5BBDACD8710A04DEB15520EEF1D4CFEDC2DFCA3895943154618918FE62DA23B722D5809C7AE170584FA8BE30267C1FAF516A5D40 to decimal 4º 873339487944179624297665682793624357542779586186821779339346113975875887520645272460238898815353382661720310066441112454002450497814716346179687199432000 5º then go to dbfactors http://factordb.com/index.php?query=...79687199432000 6º and it's supossed to be composed by: 2 2 2 2 2 2 3 5 5 5 29 59 103 151 2081 2039603 322173601224816155025890456134799554747520954466786092411112732191046966619956024078927303819677756483239813379900670701979755688047 7º now tried C:\Python27>python.exe unfactorecdsa.py PRENSA2.pdf.vvv 2 2 2 2 2 2 3 5 5 5 29 59 103 151 2081 2039603 32217360122481615502589045613479955474752095446678609241 1112732191046966619956024078927303819677756483239813379900670701979755688047 No keys found, check your factors! So whats wrong? for me moment i'm factorizing numbers by myself. Thanks 
20160104, 17:01  #20 
Jan 2016
2^{2} Posts 
Good job Thanks

20160105, 09:36  #21 
Dec 2015
100_{2} Posts 
just factorized some other numbers and put them into factdb :) if anyone need help in factoring for teslacrypt data recovery i am always avaible
thanks for all the help, suggestions and patience:) best 2016 to all of you:D 
20160105, 13:32  #22  
I moo ablest echo power!
May 2013
1852_{10} Posts 
Quote:


Thread Tools  
Similar Threads  
Thread  Thread Starter  Forum  Replies  Last Post 
Yafu performance  Teslacrypt and AES  Damien  YAFU  9  20160506 20:47 