A cybersecurity analyst receives an unfamiliar executable file suspected of being malicious. Which feature of Joe Sandbox would be most useful in analyzing this file's behavior?
Real-time user monitoring
Automatic decompilation and analysis
Automated patch management
Real-time network traffic generation