Before starting with part 3, If you haven’t read Parts 1 & 2, please read them by clicking the link 1 & 2 It’s the next day (the 21st of May) and I continue to research more about the hackerBefore I begin to explain, here is the wallet link, which we are going to analyze. It’s the same wallet we referred to in the previous part (a.k.a the ‘the origin wallet’) I did some graph analysis & here's the result.Layer 1: scammer's address Layer 2: From his to some other wallets Layer 3: Fro...