how to investigate malware attack