Exploring Adversarial Examples in Malware Detection