Michael KoczwaraFollowFeb 20·9 min read·Member-onlyMalicious DLL AnalysisStatic/Dynamic Analysis and ReversingI will be back soonIntroRight so again I will keep this intro very short. I have scanned (again) malicious infrastructure (maybe Threat Actors, maybe Red Teams, or maybe …)