▲
All documents, databases, backups and other critical data were encrypted and leaked
▲
The program uses a secure AES algorithm, which makes decryption impossible without contacting us
▲
If you refuse to negotiate, the data will be auctioned off
To recover your data, please follow the instructions
2
Open decryption page
Copy
The price depends on how soon you will contact us
Need help?