Analysis of the Ransomware FOG

Reverse-engineering the FOG ransomware to better understand how it works.