Chapter 7 – Malware Analysis