Ransomware encrypts files over a focused process and demands a ransom for his or her decryption. Attackers obtain Manage as a result of RCE, initiate the ransomware assault, and request a ransom payment.This allows an attacker to shape the commands executed around the vulnerable program or to execute arbitrary code on it.Apply the Principle of Leas