Figure 2: Extracted malware features.