Down the Malware Rabbit Hole: Part II