MalwareSourceCode/MSIL/HackTool/Win32/K/HackTool.Win32.Kiser.arr-d9e3046447f55f0acbc9626459367c8d8226ca5bb85aad312f680810b76a22b6/p2XtB2VTdFjK0JQIVK/MdFubyyWUT0jdlleiq.cs

51 lines
1.6 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: p2XtB2VTdFjK0JQIVK.MdFubyyWUT0jdlleiq
// Assembly: Kaspersky GLORY v1, Version=1.0.1.0, Culture=neutral, PublicKeyToken=null
// MVID: E47827BB-114D-421C-9576-332833461261
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00002-msil\HackTool.Win32.Kiser.arr-d9e3046447f55f0acbc9626459367c8d8226ca5bb85aad312f680810b76a22b6.exe
using Microsoft.VisualBasic;
using Microsoft.VisualBasic.CompilerServices;
using PiDHnfAR7iBcyRY1A4;
using System.CodeDom.Compiler;
using System.ComponentModel;
using System.Diagnostics;
using System.Runtime.CompilerServices;
using System.Runtime.InteropServices;
namespace p2XtB2VTdFjK0JQIVK
{
[HideModuleName]
[StandardModule]
[GeneratedCode("MyTemplate", "10.0.0.0")]
internal sealed class MdFubyyWUT0jdlleiq
{
static MdFubyyWUT0jdlleiq() => \u0032xlZRjWMTMLrRPrwuC.\u0038wGy8Btdv();
[EditorBrowsable(EditorBrowsableState.Never)]
[ComVisible(false)]
internal sealed class kmiJxR0smO2aJ5fRa4<T> where T : new()
{
[DebuggerHidden]
[SpecialName]
[MethodImpl(MethodImplOptions.NoInlining)]
internal T WHGs5tnTk() => (T) null;
[DebuggerHidden]
[EditorBrowsable(EditorBrowsableState.Never)]
[MethodImpl(MethodImplOptions.NoInlining)]
public kmiJxR0smO2aJ5fRa4()
{
}
[MethodImpl(MethodImplOptions.NoInlining)]
internal static bool BuYVlBywHq5UKSARc0() => true;
[MethodImpl(MethodImplOptions.NoInlining)]
internal static bool JU5aw2pFf7AkEFDqA8() => true;
static kmiJxR0smO2aJ5fRa4() => \u0032xlZRjWMTMLrRPrwuC.\u0038wGy8Btdv();
}
}
}