Ransomware Techniques in 2022: How to Detect Malicious Activity