The document analyzes two malware samples provided by the Microsoft Malware Protection Center challenge. For sample 1, a login program, the author finds usernames and cracks passwords in the strings to bypass the login. Alternatively, they patch the program to skip password checking. This reveals instructions to obtain sample 2. Sample 2 is a pump controller program. The author answers questions about its commands, temperature modeling loop logic, and vulnerabilities. They are able to manipulate objects and answer all questions by disassembling and debugging the samples.