Fig. 5From: Ransomware deployment methods and analysis: views from a predictive model and human responsesStart and end times of Windows API function calls in the mapping state of the Randep model for TeslaCryptBack to article page