thenitsjustmergingthegpxandusingthesamegpxvisualizingsiteiusedinmaplectf(https://www.gpsvisualizer.com/) to get the flag lmao (had to squint at the handwriting tho lmfao)
then[@Robert](https://maplebacon.org/authors/Nneonneo/) came in and said its base32 coz of the `===` and full uppercase and dang it actually is base32 lmao
funnilyenoughthesaltusedfortheirencryptionis`DcRatByqwqdanchun`,whichwecansearchonlineandfindthatitsactuallyanactivemalwareandhastoolsfordecryptingtheirsettingsdatahttps://github.com/jeFF0Falltrades/Tutorials/blob/master/asyncrat_config_parser (even tho its trivial to copy code from their encryption class to decrypt it ourselves but eyy saves us time)