Malwrologist
Malwrologist
60H (96) is an array  rgVal (data) starts at index 11  can be double or unicode string   
Code: https://github.com/DissectMalware/xlrd2/blob/1900ebd5f99d113648ac3f42a3ea5495faf0d1c9/xlrd2/formula.py#L1546
Can you please share the sample files so I can also check?
I am thinking about [xlrd2](https://github.com/DissectMalware/xlrd2) as well. It also shows relative cell addressing in r1c1 notation.... if we change here, I also need to change there
Sorry for the late response. @diyarbagis @bek01 @Hadiqa-khan @Aphetoros please share the sample or its hash so I can investigate.
Sorry for such a late response. I totally missed this issue. I will take a look into this and will address the issue.
Can you share the sample? or if it is on VirusTotal, share the SHA256? Without having the sample it is very hard to debug. Most probably the .one file contains...
Can you share the file with me? without the file I am not able to debug and see what the problem is. If it is on VT or any other...
Make sense as I have not covered all filenode types. If the program cannot parse a filenode, it might result in jumping to a location in file that does not...
Thank you for sharing the sample, will check soon