During the encryption process the batch file will also export the private key that was used to encrypt the data to a file called XRTN.key. This file will also contain other information such as the ...
Update 10/15/16: I have updated the article below to address that this ransomware is not continuously monitoring for files. When the ransomware runs it will target the %Desktop% first and then encrypt ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results