Detailed Analysis Of Ransomware Encryption Function