[rwth-security] Why the newly discovered Microsoft Windows ‘fileless’ log exploit is a marvel of stealth