Malware Analysis: The Danger of Connecting the Dots