._locked ransomware decryption Server poisoning decryption maliflynanth@aol.com Database ransomware decryption recovery ._locked
Customer name Confidential
Data
type SQL 2008R2 An ERP software database
Data capacity 58 GB
Fault type The server is encrypted by maliflynanth@aol.com ransomware, resulting in all files being encrypted by ransomware, and the extension becomes ._locked
After analysis maliflynanth@aol.com ransomware encryption is less and the completeness of patching and repair is high. Ransom Letter how_to_decrypt.hta
Repair Results Extract data from database files encrypted by maliflynanth@aol.com ransomware virus and rebuild them into a new library to complete the recovery completeness of 100%.
The repaired database file can be used directly by the ERP.
Consuming 5 hours of man-hours Lightning repair
Shenzhen Excellent Data Rescue Center friendly reminder: important data must be backed up frequently, encounter data loss and data corruption and other problems, you should contact professionals as soon
as possible. For all kinds of mainstream databases, we can do the lowest level of data recovery and data repair, for
some specific failures of the database we guarantee that the database is 100% intact recovery, no matter how large the database
is immediately desirable.
![](https://static.wixstatic.com/media/206e9d_85b34fa7133a4bdeb3d6d77238a41980~mv2.png/v1/fill/w_653,h_394,al_c,q_85,enc_auto/206e9d_85b34fa7133a4bdeb3d6d77238a41980~mv2.png)
Comments