Common Obfuscation methods used by Malware: Ep 8