During Dynamic Malware Analysis in a sandbox at a healthcare provider in Nashville, the sample shows no immediate network activity. After a controlled restart, the executable launches automatically at logon without user interaction. To capture the system changes responsible for this behavior across a reboot cycle, what area of system activity should investigators focus on monitoring?
Submit