==================================================
==================================================
>> Welcome to the Vault, fellow hunter! This log outlines common ransomware behaviors, key hunt indicators, cool discoveries, and handy query syntaxes.
>> Please select an option from below:
==================================================