Creating Valid Adversarial Examples of Malware