D. Bisson, C&C Servers? Too Risky! Android Botnet Goes with Twitter Instead), https://www.bleepingcomputer.com/news/security/ candc-servers-too-risky-android-botnet-goes-with-twitter-instead, 2016.

C. E. Bonferroni, Teoria statistica delle classi e calcolo delle probabilita, Libreria internazionale Seeber, 1936.

C. Cimpanu, Microsoft Announces Controlled Folder Access to Fend Off Crypto- Ransomware. https://www.bleepingcomputer.com/news/microsoft/microsoft- announces-controlled-folder-access-to-fend-off-crypto-ransomware, 2017.

. Clonezilla, The Free and Open Source Software for Disk Imaging and Cloning

A. Continella, A. Guagnelli, G. Zingaro, G. De-pasquale, A. Barenghi et al., ShieldFS, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC '16, pp.336-347, 2016.
DOI : 10.1109/SECPRI.1996.502676

C. , , 2013.

C. Dew and W. , CrystalDiskMark is a disk benchmark software

, Digital Corpora: Producing the Digital Body

. Geekbench, New benchmarks, redesigned interface, http://geekbench.com/ 10. GNU Octave: Scientific Programming Language

C. Haschek, How to defend your website with ZIP bombs. https://blog.haschek. at/2017/how-to-defend-your-website-with-zip-bombs.html, 2017.

A. Ivanov and F. Sinitsyn, The first cryptor to exploit Telegram), https://securelist.com/blog/research/76558/the-first-cryptor- to-exploit-telegram, 2016.

A. Kharraz, S. Arshad, C. Mulliner, W. Robertson, and E. Kirda, UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware, Proceedings of the 25th USENIX Security Symposium, pp.757-772, 2016.

A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, and E. Kirda, Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp.3-24, 2015.
DOI : 10.1007/978-3-319-20550-2_1

E. Kolodenker, W. Koch, G. Stringhini, and M. Egele, PayBreak, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, pp.599-611, 2017.
DOI : 10.1109/SECPRI.1996.502676

, Malekal: Malware Repository

F. Mbol, J. M. Robert, and A. Sadighian, An Efficient Approach to Detect Torrent- Locker Ransomware in Computer Systems, International Conference on Cryptology and Network Security, pp.532-541, 2016.
DOI : 10.1007/978-3-319-48965-0_32

, Microsoft: File System Minifilter Drivers

. Microsoft, Windows Performance Toolkit, https://msdn.microsoft.com/en-us/ windows

A. Palisse, L. Bouder, H. , L. Guernic, C. Legay et al., Ransomware and the Legacy Crypto API, The 11th International Conference on Risks and Security of Internet and Systems, 2016.
DOI : 10.1007/978-3-540-68351-3_8

URL : https://hal.archives-ouvertes.fr/hal-01388056

, The Complete Benchmark for Windows 8.1, Windows 8 and Windows 7, https://www.futuremark.com/benchmarks/pcmark 22. PolarToffee: Found a sample of the AES-NI ransomware, PCMark, vol.8, 2017.

N. Scaife, H. Carter, P. Traynor, and K. R. Butler, CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp.303-312, 2016.
DOI : 10.1109/ICDCS.2016.46

M. Sebastián, R. Rivera, P. Kotzias, and J. Caballero, AVclass: A Tool for Massive Malware Labeling, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.230-253, 2016.
DOI : 10.1109/SP.2012.16

. Sonicwall, Annual Threat Report. Tech. rep., SonicWall, 2017.

T. The and . Group, Trend Micro: CryLocker Uses Imgur as C&C, 2016.

, http://blog.trendmicro.com/trendlabs-security-intelligence/cerber- starts-evading-machine-learning, 2017.

, Viper: Binary management and analysis framework

, VirusShare: Malware Repository

P. Wardle, Towards Generic Ransomware Detection, 2016.

A. Young and M. Yung, Cryptovirology: extortion-based security threats and countermeasures, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.129-140, 1996.
DOI : 10.1109/SECPRI.1996.502676

A. L. Young and M. M. Yung, An implementation of Cryptoviral Extortion Using Microsoft's Crypto API, CiteSeerX, 2005.