// Decompiled with JetBrains decompiler // Type:  // Assembly: crypted, Version=4.9.4.5, Culture=neutral, PublicKeyToken=null // MVID: 39ED6F8C-EF75-4E88-8706-EBD78B0ECCC1 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00002-msil\Trojan-Dropper.Win32.Injector.elwj-8012f8d9cbc27bdc5242e812bac1932349108916abac095e249196a1ff3b491d.exe using Microsoft.VisualBasic.CompilerServices; using Microsoft.Win32; using System.Reflection; using System.Resources; [StandardModule] internal sealed class \u000E { public static ResourceManager \u0002 = new ResourceManager(\u000F.\u0002(2060968635), Assembly.GetExecutingAssembly()); public static string \u0003 = Assembly.GetExecutingAssembly().GetModules()[0].FullyQualifiedName; public static RegistryKey \u0005; public static string \u0008 = \u0006.\u0002(\u000F.\u0002(2060968590), \u000F.\u0002(2060968605)); public static object \u0002() { object obj; return obj; } }