Analyzing Malicious Documents Cheat Sheet