// Decompiled with JetBrains decompiler // Type:  // Assembly: App, Version=6.11.5.1, Culture=neutral, PublicKeyToken=null // MVID: 843578DF-6576-45E1-B6A2-485233E8A253 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Dapato.bfdc-b8ca4f2cda6f49778d6840b2eff24c49fe4212060200c667d42e2986a9ec3a86.exe using System; using System.IO; using System.Reflection; internal sealed class \uE008 { public static string \uE000(string _param0, int _param1) { if (DateTime.Now > new DateTime(634748065894698000L)) throw new Exception(); return string.Intern(\uE008.\uE001.\uE000.\uE000(_param0, _param1)); } public static string \uE000 => "b04a440ecec501b0"; private sealed class \uE001 { public static readonly \uE008.\uE001 \uE000; private byte[] \uE001; static \uE001() { if (DateTime.Now > new DateTime(634748065894074000L)) throw new Exception(); \uE008.\uE001.\uE000 = new \uE008.\uE001(); } private \uE001() { Stream manifestResourceStream = Assembly.GetExecutingAssembly().GetManifestResourceStream(\uE008.\uE000); if (manifestResourceStream == null) return; this.\uE001 = new byte[256]; manifestResourceStream.Read(this.\uE001, 0, this.\uE001.Length); } public string \uE000(string _param1, int _param2) { int length = _param1.Length; int index = _param2 & (int) byte.MaxValue; char[] charArray = _param1.ToCharArray(); while (--length >= 0) charArray[length] = (char) ((uint) charArray[length] ^ ((uint) this.\uE001[index] | (uint) _param2)); return string.Intern(new string(charArray)); } } }