Which evasion method serves as an important functionality of ransomware?