In the lab for this chapter, you will use 1 malware sample file. You will use locky.exe from the Chapter 5 folder. Capture the contents(screenshot) of the registry both before and after execution of the malware sample. Have ProcMon running to capture the change in the processes running during the execution of the malware sample. Determine if there are indications of DLL Injection, PE Injection, and Thread Execution Hijacking. Write a brief synopsis(It really is brief) explaining if there are indications of DLL Injection, PE Injection, and Thread Execution Hijacking for the malware sample locky.exe . Provide screen captures of each step . DO NOT OPEN CHAPTER FILES OUTSIDE OF VIRTUAL MACHINE THEY ARE LIVE. ( I use Oracle VM VirtualBox) https://github.com/PacktPublishing/Malware-Analysis-Techniques Password is “infected” ^ 1407669 a minute ago I have the completed 1st half of the lab which is attached all that’s needed is the information for the screenshots in the empty half ” DLL Injection, PE Injection, and Thread Execution Hijacking”