Introduction - If you have any usage issues, please Google them yourself
Executing malware in a controlled environment is one of
the most popular and effective methods of extracting the
behavior characters of malware. In this paper, we propose a
dynamic analysis technique to explore the different behaviors
of malware. We utilized environment constitution to create
comprehensive reports on malware.