Lucrative Ransomware Attacks: Analysis of the Cryptowall Version 3 Threat