Chapter 3: RedLine Malware: A closer look