Notes on Malware Analysis of the Trojan Powelik