chicchi Level 1 Thread author Jul 23, 2017 9 27 26 japan Nov 29, 2017 #1 Hi, Although I am interested, When malware performs encryption processing, 1. Communicate with C & C server 2. Encrypt the file Do you know who is doing cryptographic processing elsewhere? If I do not know I can only sleep a little. Reactions: Daljeet
Hi, Although I am interested, When malware performs encryption processing, 1. Communicate with C & C server 2. Encrypt the file Do you know who is doing cryptographic processing elsewhere? If I do not know I can only sleep a little.