Please wait while you're being redirected to http://www.welivesecurity.com/2016/04/04/analysis-of-the-locky-infection-process/

If your browser does not support automatic redirect please click this link.