Cheat Sheet for Analyzing Malicious Software