Hunting for Ransomware with Powershell

  This is part 2 of the series on remote IOC scanning with Powershell. We left off with our script being able to scan remotely for the existence of files and registry keys. The limitation we had so far was that when we specified registry keys in the HKEY_CURRENT_USER hive …