Consider the following snippet of assembly code: lea     si…

Consider the following snippet of assembly code: lea     si, Start   ;  push   ecx pop     ecx mov  sp, 0682 ;  Decrypt: xor    【si】,si       ; xor    【si】,sp      ;  swap  eax, ebx swap  ebx, eax inc    si             ;  dec   sp             ;  jnz    Decrypt   ;  … Start:                 ;  1). It contains two types of virus: encrypted virus and virus. 2). Codes in lines 1, , , 6, 7, …, could be used as its virus signature. 3). How many encryption keys are used in this possible virus? There are keys. 4). Does this program have the anti-debug feature? (type ‘Yes’ or ‘No’) 5). What could be the best way to detect this possible virus? By releasing it in a .

1. Why a file encrypted by Wannacry can be possibly recovere…

1. Why a file encrypted by Wannacry can be possibly recovered? 2. Consider the following FAT and root directory. Originally there were three files. A file named ‘quiz.doc’ was permanently deleted. List the ordered clusters that may store this file.The FAT of a laptop is like the following:2345678948700056And the root directory table:File 1File 7Homework1.docHomework2.doc23