Reverse Engineering Tiktok's VM Obfuscation (Part 2)