This document discusses various techniques used for malware analysis and anti-analysis. It describes levels of malware sophistication from mass to advanced. It also outlines methods used for static analysis, debugging, and bypassing anti-debugging techniques. The document provides references to papers on anti-debugging, anti-virtualization, and unpacking malware. It briefly describes examples of VB6 and C++ packers as well as sneaky exploits and payloads.