Flare-On 7: Challenge 11 – Rabbit Hole - FireEye

the Base64 encoded loader shellcode at the beginning of the script. The easiest way to debug this is to use the ageold trick of replacing the first- opcode of the payload with a self-jump (JMP $5 aka. EB FE). Just - right-click on the "D" value in the Registry Editor and select Modify Binary Data… to … ................
................