Analyzing Malicious Behavior Effectively