cl0p Ransomware Victim: paragongri-com

NOTE: The information on this page is fully automated and scraped directly from the cl0p .onion Dark Web Tor Blog page and reposted here for awareness.

SCREENSHOTS, PII and LINKS have been automatically removed before posting here. If you want to see that content you can visit the tor url located here:
hXXp://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad[.]onion/paragongri-com

cl0p

Paragon Global Resources
Revenue $7 million
Employees 10 – 100
Primary Industry 54 Professional, Scientific & Technical Services
Address 30071 Tomas, Ste 200 Rancho Santa Margarita, CA 92688


FILES PART1 – EXTRACTED EMAILS
[email protected]
Auto_Archive.pst
bthomas.pst
dbahr.pst



















FILES PART2 – EXTRACTED EMAILS
[email protected]
[email protected]







FILES PART3 – EXTRACTED EMAILS
Personal Folders(1).pst
tpolk.pst


FILES PART4 – – EXTRACTED EMAILS



















FILES PART5







FILES PART6








FILES PART7























FILES PART8



















FILES PART9











FILES PART10











FILES PART11
















FILES PART12 – OPERATIONS



































FILES PART13











FILES PART14











































































To get additional information, please download the Tor Browser and then visit the onion site located here: (to defang, remove the [.] and replace with . Also change hXXp to http) You can then copy and paste it into the Tor browser to get updates regarding this victim of cl0p Ransomware