Chapter 6: Investigating Good Known and Ugly Malware