Create a staging directory and generate a cryto key there. Discover the directories inside a user's home folder then
safely encrypt all files inside the directories using the generated key. Compress the staging directory to prepare the
crypto key for exfiltration and open a ransom note on the system.