Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' ...
I did not download a file locker. I repurposed a tool I already had.