Malicious documents analysis: my own list of tools