A Computer Hacking Forensics Investigator is analyzing a malware sample named "payload.exe". They have run the malware on a test workstation, and used a tool named WhatChanged Portable to monitor host integrity by capturing the system state before and after the malware execution. After comparing these two snapshots, the investigator observes that an entry named CjNWWyUJ has been created under the Run registry key with value C:\Users\\AppData\Local\Temp\xKNkeLQI.vbs. Given this information, what conclusion c
A. The malware is performing a denial of service attack
B. The malware has deleted system files on the workstation
C. The malware has corrupted the Windows registry
D. The malware creates a persistent connection with the machine on startup