Exploitation of the K7 antivirus, from the vulnerability discovery to the retro-analysis of its key components.