Decrypting Malicious PDF Documents Part Two - Synack