There is a potential BYTECODE virus in the “OPEN SOURCE” Microsoft products MAASGRAVE activator. Here is how the virus is hidden and created AT RUN TIME!
https://github.com/massgravel/Microsoft-Activation-Scripts
I ran the MASSGRAVE “open source” activator on a virtual machine using VMware Workstation. The “open source” code actually also contains “BYTECODE” sections. WHEN YOU RUN THE “HARMLESS LOOKING open source” script, IT basically constructs several virus exe files during runtime FROM THE BYTECODE SECTION !!
TSforge_Activation.exe" TSforgeCLI.exe LibTSforge.dll
These exe files are what does the activation. It also installs backdoors, and potential malware !!
Can some other developer verify this on a virtual machine?
Please spread this message to more advanced Software engineers who understand “BYTECODE” HIDING and exe construction IN OPENSOURCE SCRIPTS AND HAVE THEM TAKE A LOOK AT IT! Also the first method makes you trust a their website! You don’t know what you are downloading from them!
I tried to post this Redit, but Redit is blocking this!
Tough audience here, huh?
Have you tried checking what the bytecode does? Maybe it’s just a way to block detection by Microsoft and antivirus programs, by creating a different binary every time. Just because something isn’t written in a high level language doesn’t mean it’s malicious. But it may be.