Targeting Microsoft: Ransomware Techniques and How to Spot Them