Ykcol Ransomware is newest version of previously described Locky ransomware. New variant uses RSA-2048 and AES-128 cryptographic algorithms and appends .ykcol to he end of all encrypted files. Virus also modifies filenames using the following template: [8_random_hexadecimal_characters]-[4_random_hexadecimal_characters]-[4_random_hexadecimal_characters]-[4_hexadecimal_chars]-[12_random_hexadecimal_characters].ykcol. In order to decrypt your files malware demands 0.25 BTC, which is on the date of writing this article is equivalent to $950. Ykcol Ransomware creates two files named ykcol.htm and ykcol.bmp, both contain instructions to pay the ransom and ID.