This is a technical report of 2,750 words.Task one is purely analysis.Task -2 you have to use Windows-7 virtual machine. you will each steps using picture demonstration. Task 3, you also provide screen shot of your demonstration and you will use Linux for the malware analysis. Forensic tools to consider are FTK Imager, DumpIT, Fedora, Kali etcComments from CustomerTask 3 is all about Static and Dynamic analysis. For Task -2 and Task 3, there should step by step demonstration using screen shots and pictures explaining the steps