How To Perform A Malware Analysis