5 Ways to Find Encryption in Malware