Hi, Although I am interested, When malware performs encryption processing, 1. Communicate with C & C server 2. Encrypt the file Do you know who is doing cryptographic processing elsewhere? If I do not know I can only sleep a little.