Text this: Analyses of malicious software long term activity – a case study