Ransomware Research

STOP

STOP was first discovered in December 2017 in enterprise cloud environments. STOP is found in environments with a number of different names, including STOP-Keypass, STOP-Djvu, Djvu, etc. For a full list of all names, please see below.

Name

STOP

 

First Seen

December 2017

Targeting

Behavior of STOP

STOP is known to target specific file types. Below are all known file types that STOP is known to infect.

In some cases, ransomware will update the modified date, when it encrypts files. STOP updates the last modified date of the file it targets.

Details

Characteristics of STOP

Suffixes

Some ransomware will change or append a suffix to the end of the file after they are encrypted, including changing the extension of a file. Here are some of the possible suffixes that STOP ransomware is known to change.

Suffixes

.STOP, .promorad, .DATASTOP, .STOPDATA, .KEYPASS, .WHY, .SAVEfiles, .DATAWAIT, .INFOWAIT, .puma, .pumax, .pumas, .shadow, .djvu, .jzeq, .jzie, .djvuu, .udjvu, .uudjvu, .codnat, .djvuq, .djvus, .djvur, .djvut, .djvup, .pdff, .tro, .tfude, .tfudeq, .tfudet, .rumba, .adobe, .adobee, .blower, .promos, .promoz, .promok, .promorad2, .kroput, .kroput1, .charck, .pulsar1, .klope, .kropun, .charcl, .kropun1, .doples, .luces, .luceq, .chech, .proden, .drume, .tronas, .grovas, .trosak, .grovat, .roland, .refols, .raldug, .etols, .guvara, .browec, .norvas, .moresa, .verasto, .hrosas, .kiratos, .todarius, .hofos, .roldat, .dutan, .sarut, .fedasot, .berost, .forasom, .fordan, .bufas, .dotmap, .radman, .ferosas, .rectot, .skymap, .mogera, .rezuc, .stone, .redmat, .lanset, .davda, .poret, .pidon, .heroset, .boston, .myskle, .muslat, .gerosan, .vesad, .horon, .neras, .truke, .dalle, .lotep, .nusar, .litar, .besub, .cezor, .gycc, .gyew, .gyza, .lokas, .godes, .budak, .vusad, .herad, .berosuce, .gehad, .gusau, .madek, .tocue, .darus, .lapoi, .todar, .dodoc, .bopador, .novasof, .ntuseg, .ndarod, .access, .format, .nelasod, .mogranos, .cosakos, .nvetud, .lotej, .kovasoh, .prandel, .zatrov, .masok, .brusaf, .londec, .krusop, .mtogas, .nasoh, .coharos, .nacro, .pedro, .nuksus, .vesrato, .cetori, .masodas, .stare, .carote, .shariz, .gero, .hese, .xoza, .seto, .peta, .moka, .meds, .kvag, .domn, .karl, .nesa, .boot, .noos, .kuub, .reco, .bora, .leto, .nols, .werd, .coot, .derp, .nakw, .meka, .toec, .mosk, .lokf, .peet, .grod, .mbed, .kodg, .zobm, .rote, .msop, .hets, .righ, .gesd, .merl, .mkos, .nbes, .piny, .redl, .kodc, .nosu, .repp, .alka, .bboo, .rooe, .mmnn, .ooss, .mool, .nppp, .rezm, .lokd, .jazi, .jawr, .foop, .remk, .npsk, .opqz, .mado, .jope, .mpaj, .lalo, .lezp, .qewe, .mpal, .sqpc, .mzlq, .koti, .covm, .pezi, .nlah, .kkll, .zwer, .nypd, .usam, .tabe, .vawe, .moba, .pykw, .zida, .maas, .repl, .kuus, .erif, .kook, .nile, .oonn, .vari, .boop, .geno, .kasp, .ogdo, .npph, .kolz, .copa, .lyli, .moss, .foqe, .mmpa, .efji, .iiss, .jdyi, .vpsh, .agho, .vvoa, .epor, .sglh, .lisp, .weui, .nobu, .igdm, .booa, .omfl, .igal, .qlkm, .coos, .wbxd, .pola, .cosd, .plam, .ygkz, .cadq, .tirp, .ribd, .reig, .enfp, .ekvf, .ytbn, .fdcz, .urnb, .lmas, .iicc, .wrui, .rejg, .pcqq, .igvm, .nusm, .ehiz, .eqew, .paas, .pahd, .mppq, .qscx, .sspq, .iqll, .ddsg, .gatz, .eqza, .gash, .qopz, .qore, .fofd, .sato, .saba, .foty, .foza, .coty, .kiop, .kiwm, .kifr, .jycx, .jypo, .jywd, .jyos, .typo, .tyos, .tywd, .darj, .dapo, .dazx, .craa, .qarj, .qazx, .qapo, .coba, .coaq, .cosw, .goba, .goaq, .gosw, .qotr, .qoqa, .qowd, .iotr, .iowd, .ioqa, .hhoo, .hhee, .hhmm, .tgvv, .tgpo, .thgz, .bhgr, .bhui, .bhtw, .ahtw, .ahgr, .ahui, .neqp, .neon, .nerz, .erqw, .assm, .mztu, .mzop, .mzqw, .pouu, .poqw, .zouu, .zoqw, .bpto, .bpws, .bpsm, .znto, .taqw, .taoy, .tasa, .yytw, .yyza, .popn, .poaz, .wspn, .wsaz, .wsuu, .kitu, .kizu, .kiqu, .miqe, .mitu, .miza, .gaqq, .waqq, .gazp, .gayn, .wazp, .wayn, .agvv, .agpo, .aghz, .vvoo, .vvmm, .erop, .weqp, .werz, .weon, .vatq, .vaze, .vapo, .gaze, .gatq, .gapo, .xaro, .xatz, .xash, .nzoq, .teza, .nzqw, .nztt, .wzer, .wzoq, .wztt, .wzqw, .jaqw, .jaoy, .jasa, .mzre, .mzqt, .mzhi, .azop, .azqt, .azhi, .wwty, .wwpl, .wwza, .oohu, .oopl, .ooza, .hgew, .hgfu, .hgml, .hgkd, .rzew, .rzml, .rzkd, .ttwq, .ttrd, .ttap, .ttza, .mlwq, .mlrd, .mlap, .mlza, .ptqw, .pthh, .ptrz, .ithh, .itqw, .itrz, .zpas, .zput, .zpww, .ppvs, .ppvt, .ppvw, .yzqe, .yzoo, .yzaq, .nbzi, .hhuy, .hhaz, .ljuy, .ljaz, .nbwr, .niwm, .cdqw, .cdmx, .cdaz, .cdwe, .cdtt, .cdpo, .cdcc, .ldhy, .cdxx, .nooa, .qqqe, .iisa, .wnlu, .hoop, .pqgs, .orkf, .koom, .bbbw, .bbbe, .cuag, .bbbr, .yoqs, .stax, .eucy, .nqhd, .maiv, .lkfr, .lkhy, .muuq, .miia, .irjg, .rtgf, .qqqw, .moia, .zaps, .aeur, .cool, .wisz, .wiaw, .nood, .looy, .vook, .kool, .uazq, .uajs, .kaaa, .bgjs, .bgzq, .qehu, .qepi, .vepi, .vehu, .paaa, .qeza, .veza, .lqqw, .xcmb, .waqa, .zzla, .rivd, .maql, .tisc, .nqsq, .piiq, .reqg, .maak, .vtua, .guer, .qmak, .hlas, .vfgj, .neer, .sevr, .pooe, .moqs, .wiot, .efdc, .hgsh, .ufwj, .gujd, .irfk, .rigd, .mmuz, .udla, .ttii, .xcvf, .voom, .fgnh, .rigj, .sijr, .bbnm, .npsg, .xcbg, .gtys, .fgui, .hhjk, .iiof, .dewd, .jhbg, .qbaa, .nuhb, .dmay, .egfg, .mmob, .bpqd, .rguy, .dwqs, .wdlo, .zqqw, .ssoi, .hajd, .fefg

Ransomware Notes

Not all ransomware leaves a note. However, some ransomware leaves the infected party instructions on what the user should do to get rid of the ransomware, or satisfy the ransom. This often involves transferring money, often bitcoin or another cryptocurrency to a designated wallet.

Below are the type(s) of notes, content, and typical locations where Elastio has found ransom notes from STOP.

Type

File Name

Location

file

!readme.txt

EveryFolder

file

_openme.txt

EveryFolder

file

_readme.txt

EveryFolder

Executables

These are the names of the executables that contain the undetonated ransomware payload for STOP.

Executables

0302_2019-02-03_15-41.exe, 05177199.exe, 08212099.exe, 09446899.exe, 1.bin, 1.exe, 1601_2019-01-16_22-58.exe, 1846355404.EXE, 1MBIKZ45.exe, 20240829253.exe, 23954824.exe, 2401_2019-01-24_12-52.exe, 3.exe, 34EFCDSAX.EXE.TMP, 34fedwfe.exe, 39.exe, 3b84.exe, 3BD2J1DJ.exe, 3c31.exe, 3db3.exe, 419b.exe, 585939.exe, 7F2E.EXE, 850867.exe, 8687460552.EXE, A3E1binexe.exe, afvtnii.exe, aiecxdy.exe, aludci.exe, amix.exe, aslejn.exe, aylpsaww.exe, ays3ueggw.exe, azbmtwy.exe, B2.tmp.exe, bdpxte.exe, be2.exe, betting.exe, bigthing.exe, bin.bin, bqiewt.exe, brgrtv3f.exe, brpwmfdl.exe, bsvnx.exe, build.exe, buildp.exe, buildz.exe, Bujingle.exe, Buskepas.exe, cjebe.exe, covf.exe, CUsersabdoAppDataLocalde14c4d4-af10-40ba-b2e7-b7cd78dfba75FCEB.tmp.exe, CUsersUsAppDataLocalda3f3088-b399-4c9e-9d41-a0f53620c708E214.tmp.exe, cveog.exe, DHL7YG.exe, DJVU Ransomware.exe, dmkdih.exe, dubi.exe, DW8VXDZI.exe, edrgweasdvrb.exe, efzdqtpc.exe, enbyzga.exe, eqmmweay.exe, executable.exe, eyrfrip.exe, F9RT5XP5.exe, factura.exe, Fameros.exe, fce.exe, file.bin, file.exe, fjklzp.exe, fkpbzs.exe, fphemzq.exe, fqkwzdo.exe, fsprm.exe, fumiefqw.exe, funuir.exe, fwnfeic.exe, fyyfc.exe, gapijonc.exe, gayn.exe, gazp.exe, gdusei.exe, gehfgfjk.exe, gepquoqguv.exe, gFaZbGmI, gixj.exe, glitters.exe, gunshot.exe, gvhhzwub.exe, HerbalEssentials.exe, hgxctcth.exe, hlmoj.exe, Huklus.exe, humanity.exe, Hungle.exe, Hunlipaos.exe, hvfcfwbh.exe, hvlawaos.exe, HYDOADC8.exe, IEWO4X01.exe, important.exe, important_document.exe, ISJ5KN4I.exe, IVE39D.exe, jrinzssq.exe, jrsnygu.exe, jsjof.exe, jtdnwf.exe, JTDNWF.EXE, Keypass.exe, killeryuga.exe, km0TTTU1Ig.exe, krgqwi.exe, kyamstr.exe, liegkzrz.exe, load1903.exe, logger270.exe, lpjlujyr.exe, lwxhwfcu.exe, msoffice.exe, mvsnmp.exe, myfile.exe, NUMXYW9D.exe, olbkummk.exe, oqrvau.exe, oqvq.exe, ozlep.exe, PBER65.exe, pbky.exe, petshop.exe, phpAdLvuq, phpwXWVud, pqqfom.exe, proc.exe, ProcessKiller.exe, program.exe, PUQ5X3W2.exe, pzsjx.exe, qdnhqd.exe, qfnxti.exe, qgrm9yxfr9.exe, qhnvv.exe, qnsuk.exe, qoapybn.exe, qtyzkum.exe, qvwloVnL.exe, qwvqvk.exe, R2JL7SXH.exe, redcsrvtf.exe, report727.exe, rewrtrbvfd.exe, ridaigx.exe, RJ9067X4.exe, rlpvcs.exe, ryuk.exe, sample.mlw, sbap.exe, sbut.exe, Setup160.exe, sgsdfgds.exe, sifrtud, sndjxmz.exe, software.exe, sqlreader.exe, start.exe, starticon2.exe, STOP.exe, Stop.exe, Stop7.exe, svhost.exe, swyfkv.exe, talq.exe, tcygx.exe, Techniques.exe, twgiwo.exe, twgruos.exe, tygrfed.exe, ubmahi.exe, ucxiwb.exe, uiabfuuc.exe, UIXF9YSH.exe, ukqxssy.exe, update.exe, updatewin.exe, updatewin1.exe, uqksn.exe, urpress.bin, urpress.exe, uvjhup.exe, uwzqmrjc.exe, vatup.exe, vwmzyfx.exe, wchnu.exe, wcvqmaz.exe, wcyn.exe, WMPLAYER.EXE, wmplayer.exe, wnyknmp.exe, xnnhvtk.exe, xspf.exe, ycnsqgn.exe, yhom.exe, yhtvjk.exe, yipogls.exe, yowa.exe, ythgrfed.exe, YTHGRFED.EXE, yvircma.exe, yvxi.exe, zBeQxOa, zejw.exe, zldik.exe, zplgo.exe, zqvu.exe, zstimge.exe, zufocosq.exe, ZXJ9GJ.exe, zzz.exe, rfcle.exe, ckdlp.exe, qorw.exe, ljrhywfh.exe, malware.exe, gsqonx.exe, jpcmgaay.exe, crack.exe, 4088.exe, zbetcheckin_tracker_49.exe, tngub.exe, tlde.exe, xukac.exe, zunzzjvu.exe, behasavunu.exe

External Pages

Ransomware often links to external pages such as payment pages, telegram contacts, etc. Below are some of the URLs Elastio has found to be associated with STOP.

External Pages

  • https://files.danwin1210.me/uploads/01-2019/Decrypt%20Software%20Overview.avi
  • http://cjto.top/files/penelop/updatewin.exe
  • http://cjto.top/files/penelop/3.exe
  • http://balalbalalska.com/517
  • http://balalbalalska.com/freebl3.dll
  • http://balalbalalska.com/mozglue.dll
  • http://cjto.top/
  • mailto:stopfilesrestore@bitmessage.ch
  • mailto:stopfilesrestore@india.com
  • mailto:suspendedfiles@bitmessage.ch
  • mailto:suspendedfiles@india.com
  • mailto:waiting@bitmessage.ch
  • mailto:waiting@india.com
  • mailto:pausa@bitmessage.ch
  • mailto:pausa@india.com
  • mailto:decryption@bitmessage.ch
  • mailto:decryption@india.com
  • mailto:decryptiondata@bitmessage.ch
  • mailto:decryptiondata@india.com
  • mailto:datadecryption@bitmessage.ch
  • mailto:datadecryption@india.com
  • mailto:keypass@bitmessage.ch
  • mailto:keypass@india.com
  • mailto:bm-2cumy51wfnrg8jgrwcmztaseugx84yx741@bitmessage.ch
  • mailto:keypassdecrypt@india.com
  • mailto:decryptionwhy@india.com
  • mailto:bm-2cum1hg5nff9fymhpzlhjobdxqde26ibm2@bitmessage.ch
  • mailto:bm-2cxonzj9ovn5qdx2mrwmk4j3qcquxbko4h@bitmessage.ch
  • mailto:savefiles@india.com
  • mailto:pumarestore@india.com
  • mailto:helpshadow@india.com
  • mailto:helpshadow@firemail.cc
  • mailto:restoredjvu@india.com
  • mailto:restoredjvu@firemail.cc
  • mailto:blower@india.com
  • mailto:blower@firemail.cc
  • mailto:merosa@india.com
  • mailto:merosa@firemail.cc
  • mailto:merosadecryption@gmail.com
  • mailto:vengisto@india.com
  • mailto:vengisto@firemail.cc
  • mailto:gorentos@bitmessage.ch
  • mailto:mosteros@firemail.cc
  • mailto:bufalo@firemail.cc
  • mailto:stoneland@firemail.cc
  • mailto:gorentos@firemail.cc
  • mailto:ferast@firemail.cc
  • mailto:varasto@firemail.cc
  • mailto:gorentos2@firemail.cc
  • mailto:gerentoshelp@firemail.cc
  • mailto:gerentosrestore@firemail.cc
  • mailto:amundas@firemail.cc
  • mailto:salesrestoresoftware@firemail.cc
  • mailto:salesrestoresoftware@gmail.com
  • mailto:restoredatahelp@firemail.cc
  • mailto:restorefiles@firemail.cc
  • mailto:restorealldata@firemail.cc
  • mailto:datarestorehelp@firemail.cc
  • mailto:datahelp@iran.ir
  • mailto:helpmanager@firemail.cc
  • mailto:helpmanager@iran.ir
  • mailto:helpdatarestore@firemail.cc
  • mailto:helpmanager@mail.ch
  • mailto:restoremanager@firemail.cc
  • mailto:helpmanager@airmail.cc
  • mailto:helpteam@mail.ch
  • mailto:ngocquy.096613@gmail.com
  • mailto:manager@mailtemp.ch
  • mailto:helprestoremanager@airmail.cc
  • mailto:support@freshmail.top
  • mailto:datarestorehelpyou@airmail.cc
  • mailto:datarestorehelp@airmail.cc
  • mailto:support@freshingmail.top
  • mailto:pyou@airmail.cc
  • http://brusuax.com
  • http://colisumy.com
  • http://zexeq.com
  • ns:ns1.kriston.ug
  • ns:ns2.chalekin.ug
  • ns:ns3.unalelath.ug
  • ns:ns4.andromath.ug
  • http://bihsy.com
  • http://drampik.com
  • http://jiqaz.com
  • http://uaery.top
  • http://habrafa.com
  • https://we.tl/t-CnI3tI6Ktv
  • mailto:managerhelper@airmail.cc
  • mailto:support@sysmail.ch
  • mailto:supporthelp@airmail.cc
  • http://tzgl.org
  • http://lencu.top
  • http://pqkl.org
  • http://kotob.top
  • http://ring1.ug
  • http://astdg.top
  • http://securebiz.org
  • https://we.tl/t-hK4tAv2Ed9
  • https://we.tl/t-mVSS8cJcv3
  • telegram:@datarestore
  • http://vjsi.top
  • http://rlrz.org
  • http://znpst.top
  • http://fuyt.org
  • http://zerit.top
  • http://asvb.top
  • http://astdg.top
  • http://qpao.top
  • http://vizk1.ug
  • http://sajdfue.com
  • http://sdfjhuz.com
  • http://cajgtus.com
  • https://we.tl/t-7AKxZTQTdy
  • https://we.tl/t-BDgg6lyvws
  • http://mopg.top/Asjdi435784ihjk65pen2/get.php
  • http://mopg.top
  • http://tbpws.top
  • https://we.tl/t-vzAZbtWtGh
  • https://we.tl/t-NjQb8RxCzz
  • https://we.tl/t-mNr1oio2P6
  • mailto:restoremanager@airmail.cc
  • http://mohd1.ug/dfghdghshdjfsdfsdfallll/get.php
  • http://mohd1.ug
  • https://we.tl/t-fdxobfhXGn
  • https://we.tl/t-28bBaI3ZOZ
  • http://nokd.top/ydtftysdtyftysdfsdpen3/get.php
  • http://nokd.top
  • https://files.danwin1210.me/uploads/01-2019/Decrypt%20Software%20Overview.avi
  • mailto:pdfhelp@india.com
  • mailto:pdfhelp@firemail.cc
  • https://we.tl/t-eglcxvZv1s
  • https://we.tl/t-IbdGyCKhdr
  • https://we.tl/t-7cpJN3gq4f
  • https://we.tl/t-MWDNpfphPO
  • https://we.tl/t-6MtxXOdrek
  • https://we.tl/t-BxcdyO2dt7
  • https://we.tl/t-cXv7p6guVm
  • https://we.tl/t-wj1fybU0Fy
  • https://we.tl/t-O1iz3esfm2
  • https://we.tl/t-vpovVceDWN
  • https://we.tl/t-Et9nzM0uaZ
  • https://we.tl/t-sBwlEg46JX
  • https://we.tl/t-nb2ThWY25i
  • https://we.tl/t-B0FsLNO3fN
  • https://we.tl/t-J9GjESeoLZ
  • https://we.tl/t-063L4ferhE
  • https://we.tl/t-UfvM0gtUDw
  • https://we.tl/t-flMQaa7Bd2
  • https://we.tl/t-2w03ajSkK1
  • https://we.tl/t-xl2bbDnZSN
  • https://we.tl/t-r8vw6LTL4F
  • https://we.tl/t-72VNKmoPkb
  • https://we.tl/t-4Orti6OnRT
  • https://we.tl/t-7m8Wr997Sf
  • https://we.tl/t-rbzFCkr9sY
  • https://we.tl/t-W7mpKFSSv2
  • https://we.tl/t-y7G4t6cSO4
  • https://we.tl/t-iLkPxViexl
  • https://we.tl/t-ZLZ4pVnuS4
  • https://we.tl/t-Gf8avvBuir
  • https://we.tl/t-gVAtiL9yUs
  • https://we.tl/t-Xk9HCEGEfF
  • https://we.tl/t-p1HwbAuGCw
  • https://we.tl/t-SY0GqQtRAT
  • https://we.tl/t-oDZg08Mf5e
  • https://we.tl/t-ggGVjyTdgD
  • https://we.tl/t-WJa63R98Ku
  • https://we.tl/t-EEHXgjySek
  • https://we.tl/t-sdfm0uGug2
  • https://we.tl/t-hvv30uAtTY
  • https://we.tl/t-7YSRbcuaMa
  • https://we.tl/t-oEUEuysYiZ
  • https://we.tl/t-2P5WrE5b9f
  • https://we.tl/t-W8DuFk4wwu
  • https://we.tl/t-epGBENGtpY
  • https://we.tl/t-lQ7jXsWgdB
  • https://we.tl/t-jzgjeYI5Sl
  • https://vimeo.com/306940477
  • https://we.tl/t-Ov3khDZ6J9
  • https://vimeo.com/309338421
  • https://we.tl/t-aWdCfIWJJ2
  • https://we.tl/t-BZzaxzzYFX
  • https://we.tl/t-wywmvpID0O
  • https://we.tl/t-V2fE396VPW
  • https://we.tl/t-6COaKAec5A
  • https://we.tl/t-9POwROFXcM
  • https://we.tl/t-NPRyOqtXtl
  • https://we.tl/t-lfgsmr5vzo
  • bitmessage:BM-2cXonzj9ovn5qdX2MrwMK4j3qCquXBKo4h
  • https://we.tl/t-fhnNOAYC8Z
  • https://we.tl/t-WGsuBCnd3C
  • https://we.tl/t-N3p42CffoV
  • https://we.tl/t-4ltSd5zdAc
  • https://we.tl/t-CtDpAM1g5f
  • https://we.tl/t-wlvjUfRfvM
  • https://we.tl/t-8FD9fC02w8
  • https://we.tl/t-m8LBBi8x8F
  • https://we.tl/t-xuSAEnnA8P
  • https://we.tl/t-gSEEREZ5tS
  • mailto:restoreadmin@firemail.cc
  • https://we.tl/t-ll0rIToOhf
  • https://we.tl/t-tkon5qUcfl
  • https://we.tl/t-Dz5odBd07y
  • https://we.tl/t-18R6r7GGG8
  • https://we.tl/t-4NWUGZxdHc
  • https://we.tl/t-o7ClqIH7RS
  • https://we.tl/t-Be28TGxMAy
  • mailto:helprestore@firemail.cc
  • mailto:datarestore@iran.ir
  • https://we.tl/t-dFmA3YqXzs
  • https://we.tl/t-2zbBkO06mv
  • https://we.tl/t-TFI08DijHt
  • https://we.tl/t-2jkyb95pOj
  • https://we.tl/t-g2wRDh3Pih
  • https://we.tl/t-NdDG3HIUZp
  • mailto:supportsys@airmail.cc
  • https://we.tl/t-fnn5kv33Vv
  • https://we.tl/t-PRDjRCeB3y
  • mailto:manager@time2mail.ch
  • https://we.tl/t-6Ti2DxXR3I
  • https://we.tl/t-Tzr5skvBsz
  • https://we.tl/t-Tjb0YqckGX
  • https://we.tl/t-p2ngkyrMRl
  • https://we.tl/t-zHDj26n4NW
  • https://we.tl/t-pPLXOv9XTI
  • https://we.tl/t-G76puQlxBn
  • https://www.filemail.com/d/cckhkpsqjvnbjhf
  • https://we.tl/t-c565B1ILoZ
  • https://we.tl/t-FT7BNVbXC9
  • https://we.tl/t-kilPVod4em
  • https://we.tl/t-NYlGSMNN9r
  • https://we.tl/t-0S984cQ4B3
  • https://we.tl/t-neB7tZSBy8
  • https://we.tl/t-TVrnNufMGq
  • https://we.tl/t-0SLhZxAjRX
  • https://we.tl/t-j3AdKrnQie
  • mailto:admin@helpdata.top

elastio-icon
Elastio Can Help You

Don’t let ransomware
take over your data.