After gaining access to the scammer’s system, their hard drive was encrypted and locked. Files stopped opening, programs ...