Basic Malware Reverse Engineering: Part 39