From Initial Access to Ransomware Deployment: A Deep Dive into the Modern Threat Actors’ Playbook