Malware Systems — Which One meets your requirements?