Rating:

1. Unpack the archive. We get 200 more encrypted archives.
2. Try to decrypt other archives with the VishwaCTF password. Some of them open.
3. In the first archive we find two pictures. It is not difficult to guess that we should either add or subtract them.
4. Using cv2.subtract we successfully get a picture with some text, which also contains the password of the next picture.
5. We write a script to recognize text in the image. Unfortunately, it didn't work perfectly, so I had to write some passwords manually.
6. In this way almost all the archives were decrypted. However, there were some difficulties, e.g. lack of 44 archives. And some passwords did not fit. However, as I understand the task was corrected, so, returning to it a little later, I managed to decrypt almost everything.
7. The archives with the numbers immediately seemed mysterious, especially when their number increased after 100 archives. These numbers were not the passwords to the following archives.
8. The hint of ASCII in some of the passwords helped. The number on the picture is the sequence number of the character, corresponding to the archive number in the ASCII table.
9. Restoring the flag.

Flag: VishwaCTF{visualcrypnotjOke}.