Malware Forensic Analysis: Capturing What Attackers Leave Behind