I have a single malware command that was executed on my Windows machine before I wiped the system. I now need that same command run inside a fully isolated virtual machine so every stage can be captured, unpacked, and reviewed without risking any real hardware. I am primarily worried about credentials and logins, browser sessions and cookies, files and documents—really anything the attacker might have reached for. To answer that, I’m asking for a full hybrid analysis that blends static inspection of the PowerShell and Python payloads with live dynamic monitoring. Please instrument the VM, let the malware phone home if it must, watch the network traffic, intercept any staged downloads, and document each indicator of compromise. Deliverables: • A concise written report, in plain language, that explains what information the malware tried (or was able) to steal and how it does so. • A timeline of execution showing every file, registry change, or network call observed. • Any recovered payloads, decoded scripts, and IOC lists packaged in a password-protected archive. Speed matters—I’d like an initial overview the same day you finish the run, with the full report delivered ASAP. Let me know the tools you prefer (e.g., IDA, Ghidra, Procmon, Wireshark, Volatility) and your estimated turnaround once you receive the sample so we can get started right away.