I would like to know how to decipher a Windows 7 system that has been infected with a variant of Teslacrypt that:
- Encrypts a bunch of files and adds up "mp3" extension to theim
- Creates new files in many directories (PNG, HTML, TXT, WORD...) called recover+[random string] containing steps on how to pay the ransom -Adds those same files to startup menu folder "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup" so that steps to pay the ransom appear at startup
I've already tried Tesladecoder, but it turns out it didn't find the key. I'm hesitant on using teslacracker since the RSA key is 4096 lenght and that would take a lot of time to crack even for a 4GB RAM i5 CPU laptop.
So, any help is appreciated. Thanks
PS: I don't have any system backups.