Analyzing the compromised system