Analyzing Fileless Malware