This file contains additional information, probably added from the digital camera or scanner used to create or digitize it.
If the file has been modified from its original state, some details may not fully reflect the modified file.
September 23, 2013
So here's how the encryption breaks down:
The virus gains control at bootup and creates a random encryption key, which it stores in the master boot record (MBR). It then enumerates the size of the hard drive and selects the last two unencrypted cylinders on the disk, and encrypts them using the aforementioned key. It continues encrypting the last two unencrypted cylinders until it finally reaches the middle of the disk, when it outputs "Dis is one half." to the screen.
Now, the virus basically owns your hard drive. When data that resides in the encrypted cylinders is accessed, OneHalf takes control and decrypts it and then displays it to the user. However, if the virus is removed improperly (as shown in the video), the encryption key is lost and all data is permanently damaged beyond repair and must be recovered from backups.