... Doing so enables other researchers to better understand the ransomware attack mechanisms, and to examine whether the features selected are appropriate and justified. While many studies (e.g., [1-3, 8, 11, 12, 14, 17, 22, 23, 28, 32, 34-40, 43, 47, 50, 52, 55, 56, 58, 61, 62, 64, 68-70, 72, 73, 75, 80, 81, 83, 87, 90-93, 101, 102, 105, 107, 108, 111, 113, 114, 117-119, 125, 126, 130, 133, 136, 138, 142, 143, 145, 147-151]) both disclosed the malicious features of ransomware they found and justified their selection, some studies (e.g., [13,48,51,63,71,78,85,94,124,131,132,134,139,144,146,158]) only disclosed ransomware malicious features they selected without justification, and others (e.g., [4,5,7,9,10,15,16,18,20,21,26,44,45,57,60,65,74,79,84,86,95,98,99,110,112,127,129,141,154,155,157]) did not discuss ransomware malicious features at all. Ransomware malicious features are by design, and ransomware developers can implement different features in different attack vectors or patterns. ...