Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Nozelesn Ransomware Support & Help Topic (.nozelesn, HOW_FIX_NOZELESN_FILES.htm)


  • Please log in to reply
62 replies to this topic

#61 sierasie

sierasie

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 28 September 2018 - 06:55 AM

Hello, I can help u, when u have encrypted ONLY ! "database" ex. SQL, Access etc.

U can write to me on ransomware@magnes-danych.pl

In message u can sent zipped mdf, mdb etc. files and I'll see what I can do

 

 

I have many successful for repair databases from nozelesn, diskdoctor and else


Edited by sierasie, 28 September 2018 - 06:57 AM.


BC AdBot (Login to Remove)

 


#62 TechGuru11

TechGuru11

  • Members
  • 93 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:44 AM

Posted 05 October 2018 - 11:03 AM

Was anyone able to confirm or deny this variant was decryptable? 



#63 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,744 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:44 AM

Posted 05 October 2018 - 02:08 PM

Not that I am aware of.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users