Table 2 Virtual machine type detected by malware