“…Most of these studies used the static [3], [5], [10], [11], [13], [14], [17], [18], [21], [22], dynamic [4], [19] or hybrid [6] analysis methods. Actually, static analysis is becoming difficult because of the increasing sophistication of malware, and thus we focus on dynamic analysis approach.…”