“…This may be attained by encouraging the revelation from claiming concealed inter-relationships the middle of cyber-artifacts, for example, components starting with organized organize logs, proxy Furthermore IDS systems, VPN, anti-virus, DLP, DNS queries. In addition, more provision logs are from relevant data such as like email, print logs, office get logs and inside talk logs, which are mankind's assets information [20], [21]. Malware analysis process has been presents by As shown in Figure 1 that presents the overall process flow of the malware analysis performed on malware sample.…”