MalwareSourceCode/MSIL/Virus/Win32/E/Virus.Win32.Expiro.w-1f15ee7e9f7da02b6bfb4c5a5e6484eb9fa71b82d3699c54bcc7a31794b4a66d/Microsoft/InfoCards/UserNameTokenFactoryCredential.cs
2022-08-18 06:28:56 -05:00

32 lines
1019 B
C#

// Decompiled with JetBrains decompiler
// Type: Microsoft.InfoCards.UserNameTokenFactoryCredential
// Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
// MVID: ADE0A079-11DB-4A46-8BDE-D2A592CA8DEA
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Virus.Win32.Expiro.w-1f15ee7e9f7da02b6bfb4c5a5e6484eb9fa71b82d3699c54bcc7a31794b4a66d.exe
using System.IO;
namespace Microsoft.InfoCards
{
internal class UserNameTokenFactoryCredential : TokenFactoryCredential
{
private string m_userName;
private string m_password;
public UserNameTokenFactoryCredential()
: base(TokenFactoryCredentialType.UserNamePasswordCredential)
{
}
public string UserName => this.m_userName;
public string Password => this.m_password;
protected override void DeserializeData(BinaryReader reader)
{
this.m_userName = Utility.DeserializeString(reader);
this.m_password = Utility.DeserializeString(reader);
}
}
}