Since this month we will dive into core malware analysis, it will be better if we take a first hand intro into this world and its elements.In present scenario,cyber-espionage has replaced the old fashion spying methodology to obtain secret and confidential data. Therefore malware, together with other malicious activities are increasingly becoming a true weapon in the hands of the Military and Governments, used to re-establish the balance of power or better the balance of threat.