Ransomware: How to Battle the Most Evolved