Key generation method in ransomware

Do the available ransomware generate a dedicated key for each computer, or for each run on a single computer?
In fact, if a ransomware is run twice on the victim’s system, is the second encryption key equal to the first?