MalwareSourceCode/MSIL/HackTool/Win32/K/HackTool.Win32.Kiser.arr-d9e3046447f55f0acbc9626459367c8d8226ca5bb85aad312f680810b76a22b6/eWVX1sTotVGuGeBpEA/Ewv0DHKP53XXBO04Lw.cs

36 lines
1.0 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: eWVX1sTotVGuGeBpEA.Ewv0DHKP53XXBO04Lw
// Assembly: Kaspersky GLORY v1, Version=1.0.1.0, Culture=neutral, PublicKeyToken=null
// MVID: E47827BB-114D-421C-9576-332833461261
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00002-msil\HackTool.Win32.Kiser.arr-d9e3046447f55f0acbc9626459367c8d8226ca5bb85aad312f680810b76a22b6.exe
using PiDHnfAR7iBcyRY1A4;
using System.Runtime.CompilerServices;
using System.Runtime.InteropServices;
namespace eWVX1sTotVGuGeBpEA
{
internal class Ewv0DHKP53XXBO04Lw
{
private static bool Z01sru3p0;
[MethodImpl(MethodImplOptions.NoInlining)]
internal static void RMg9RvhzrSvKE()
{
}
[MethodImpl(MethodImplOptions.NoInlining)]
public Ewv0DHKP53XXBO04Lw()
{
}
[MethodImpl(MethodImplOptions.NoInlining)]
static Ewv0DHKP53XXBO04Lw() => \u0032xlZRjWMTMLrRPrwuC.\u0038wGy8Btdv();
[MethodImpl(MethodImplOptions.NoInlining)]
internal static void K3ZNjTlX67Q3pF8vIBS([In] object obj0)
{
}
}
}