Reverse Engineering Malware Day 1 Part 16: How A Debugger Works