Question: 1 . fea si . Start 2 . push e 3 . pop ecx 4 . mov sp . 0 6 8 2 ; 5

1.fea si. Start
2.push e
3.pop ecx
4.mov sp.0682;
5.Decrypt:
6.xor [si],si
7.xor [si].sp
8.swap eax, ebx
9.swap ebx, eax
10.inc si
11.dec sp
12.jnz Decrypt;
13....
14.Start:
Please answer the following questions:
1). Which kinds of virus types does it belong to? List all you can think of.
2). Codes in which lines could be used as its virus signature?
3). How many encryption keys are used in this possible virus?
4). Does this program have the anti-debug feature? Why?
5). What could be the best way to detect this possible virus?
E
Last saved 6:56:37 PM
Questions Filter (20)
G
I
:
6). Why do hackers seldom use Java to write malware? List all the reasons you can think of

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!