The anatomy of a  NET malware dropper