0 1 00:00:07,170 --> 00:00:12,900 In this section we saw real life use case of malware and the benefits of applying reverse engineering 1 2 00:00:13,750 --> 00:00:16,460 through the artifacts discovered during analysis. 2 3 00:00:16,560 --> 00:00:21,870 We were able to obtain the decryption code that would allow us to create a decryption tool for our encrypted 3 4 00:00:21,870 --> 00:00:22,470 files.