==================================================
>> Welcome to the Vault, fellow hunter! This log aims to outline a number of the most common ransomware behaviours, key things to look for on a hunt, cool stuff I’ve found, and handy query syntaxes for different vendor tools. Happy hunting!
>> To access the information, please select a subject from the list below:
The following options will provide valuable insight into potential security threats and vulnerabilities within a network. Please select an option from the list to view the content.
THIS IS MICROSFOT STUFF MAN FILL ME OUT L0L