Which malware analysis technique executes a sample in an isolated environment to observe its behavior without risking production systems?