Use the cоde_sаmple prоvided, аnswer the fоllowing questions. Specify the question number with eаch answer. 1) List 5 interesting strings that belong to the program? 2) Does the program use DLL ? If yes, what are they? Indicate if they are Microsoft Windows DLL or written by the malware author. 3) Indicate any Imported and Exported Functions by the program. 4) Indicate the program sections and their respective size. 5) What is the start address of the main function and the scopy (which behaves like strcpy) function? 6) How many of loops do you identify in this program? 7) How many if statements in the program? 8) How many time is xor eax, eax used in the program ?