ethical-hacker video for fill in the blank: To inspect the API calls made by a malware sample during execution, security analysts use the tool _____.
Fill in the blank: To inspect the API calls made by a malware sample during execution, security analysts use the tool _____.