Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools [1]