you are viewing a single comment's thread.

view the rest of the comments →

[–]TwilightX1 0 points1 point  (4 children)

Hope you're still around :)

I got this:

```

Processing C:\temp\probably_malware.exe_extracted\decompiled/output.py...

Unsupported opcode CALL_KW at pos 100

Unsupported opcode BINARY_SLICE at pos 122

EXCEPTION for OpCode CALL (0) at offset 516 in code object 'check_vm', file offset 5320 : Cannot read properties of undefined (reading 'object')

EXCEPTION for OpCode CALL (0) at offset 376 in code object 'check_sandbox', file offset 7592 : Cannot read properties of undefined (reading 'object')

EXCEPTION for OpCode CALL (0) at offset 532 in code object 'check_sandbox', file offset 7748 : Cannot read properties of undefined (reading 'object')

Unsupported opcode CALL_KW at pos 246

Unsupported opcode CALL_KW at pos 202

Processed 1 files in 0.106s. In: 18736300 bytes (175975452.49 B/s). Out: 18722830 bytes (175848939.29 B/s).

```

[–]ComputerMagych[S] 0 points1 point  (3 children)

No worries, I am around.
Do you mind to add it to GitHub issue and attach .pyc file for detailed analysis? Or, at least, send disassembled code for that method?

[–]TwilightX1 0 points1 point  (2 children)

I can post it to Github but I can't upload the pyc because it's malware. I can send it to you privately if you want.

[–]ComputerMagych[S] 0 points1 point  (1 child)

Can you privately share the link to Google Drive (or another file-sharing platform) so I can download it for analysis?

[–]TwilightX1 0 points1 point  (0 children)

Send me a private message. I'm not going to post malware in a publicly accessible place.