Dissecting Windows Malware Series – Explaining Rootkits: Practical Examples & Investigation Methods – Part 6