Tags chapter 11 chapter 31 Malware analysis1 phishing1 Practical Malware Analysis Chapter 51 Practical Malware Analysis Chapter 61 Splunk1