- Distribution Method : Downloading .appx file via fake web browser update messages
 
 - MD5 : 4fa1c2e75d0d5e0ef087538fe3c79824
 
 - Encrypted File Pattern : .<7~9Digit English Small Letter Random>
 
 - Malicious File Creation Location :
 - C:\Program Files\WindowsApps\3669e262-ec02-4e9d-bcb4-3d008b4afac9_96.0.1072.0_neutral__vgngsjmdj8sje
 - C:\Program Files\WindowsApps\3669e262-ec02-4e9d-bcb4-3d008b4afac9_96.0.1072.0_neutral__vgngsjmdj8sje\<Random>
 - C:\Program Files\WindowsApps\3669e262-ec02-4e9d-bcb4-3d008b4afac9_96.0.1072.0_neutral__vgngsjmdj8sje\<Random>\<Random>.dll
 - C:\Program Files\WindowsApps\3669e262-ec02-4e9d-bcb4-3d008b4afac9_96.0.1072.0_neutral__vgngsjmdj8sje\<Random>\<Random>.exe
 - C:\Users\Public\readme.txt 
 - Payment Instruction File : readme.txt
 
 - Major Characteristics :
 - Use a "Foresee Consulting Inc." Digital Signatures
 - Disable system restore (vssadmin.exe Delete Shadows /all /quiet) 
 
					List