A forum for reverse engineering, OS internals and malware analysis 

Discussion on reverse-engineering and debugging.
 #26903  by DMEW
 Fri Oct 09, 2015 12:53 am
I unpacked a VB malware (thats compiled to pcode) and decompiled it to readible instructions using VBDecompiler. The instructions look like "FLdRfVar/NextI4/etc" and are frankly not very readible off the bat. I have gotten SOME useful information through reading this, but I really need/want to debug. I know if I use Ollydbg Ill just end up in MsVBvm60.dll and be miserable. Should I just buck up and do it? Id like to hear from anyone experienced with this if there are there better ways to further analyze VB samples like this? Thanks in advanced