How to Analyze Malware’s Network Traffic in A Sandbox