Unveiling Stealth Attack Paths in Windows Environments Using AWARE