Login Register About This page about program was named "Data Keeper". This program cryptes data when it launched on MS Windows operations systems. Features Free for download and use: distributed as RaaS (Ransom as a Service). Used CrystalPartnership technology. Customizable victim's payment amount in BTC. Each executable file will be created with unique compilation's token and unique RSA-4096 key pair. Sample decryption service for each victim: 3 files less than 1MB will be decrypted. Possibility of attaching your file to output executable. Protected & obfuscated source code and compiled modules. Without using command server: only TOR hidden service link generated when data encrypted. High performance: encrypting random first 400-1200 MB for large files. Main module sleeps in memory 3-60 seconds before starts. Multithread encrypting. Optional: running with administrative rights. If it happened then restore system points will be removed. Optional: encrypt all network shared resources in all subnet's computers. Optional: executing itself on remote computers with stored and customized credentials. Additional: Mutant Generator - client tool for hiding from antiviruses. How it works Encryption. Decryption. Click here to register
Feb 22, 2026
Login Register

Organization Details
Login Register About This page about program was named "Data Keeper". This program cryptes data when it launched on MS Windows operations systems. Features Free for download and use: distributed as RaaS (Ransom as a Service). Used CrystalPartnership technology. Customizable victim's payment amount in BTC. Each executable file will be created with unique compilation's token and unique RSA-4096 key pair. Sample decryption service for each victim: 3 files less than 1MB will be decrypted. Possibility of attaching your file to output executable. Protected & obfuscated source code and compiled modules. Without using command server: only TOR hidden service link generated when data encrypted. High performance: encrypting random first 400-1200 MB for large files. Main module sleeps in memory 3-60 seconds before starts. Multithread encrypting. Optional: running with administrative rights. If it happened then restore system points will be removed. Optional: encrypt all network shared resources in all subnet's computers. Optional: executing itself on remote computers with stored and customized credentials. Additional: Mutant Generator - client tool for hiding from antiviruses. How it works Encryption. Decryption. Click here to register
Leak Data
1MB
Feb 22, 2026
Feb 22, 2026
http://dc4nwiijwiffwztwzj5fngmcoppedrxg4jqj2tq67ontbini6qmlguid.onion/index.phpThreat Group
datakeeper
ransomware group
View full group profile →