Analysis avoidance techniques of malicious software