Question: 1 . fea si . Start 2 . push e 3 . pop ecx 4 . mov sp . 0 6 8 2 ; 5
fea si Start
push e
pop ecx
mov sp;
Decrypt:
xor sisi
xor sisp
swap eax, ebx
swap ebx, eax
inc si
dec sp
jnz Decrypt;
Start:
Please answer the following questions:
Which kinds of virus types does it belong to List all you can think of
Codes in which lines could be used as its virus signature?
How many encryption keys are used in this possible virus?
Does this program have the antidebug feature? Why?
What could be the best way to detect this possible virus?
E
Last saved :: PM
Questions Filter
G
I
:
Why do hackers seldom use Java to write malware? List all the reasons you can think of
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
