⛔️ Spoiler alert! Case Details This is not an investigation like the previous one. This is threat hunting.
Windows Most information is taken from here, but more visualisation is added. The screenshots from IDA Pro are also copied from that blog post.