BASICALLY IT USES BASE ENCODE / DECODE , AS YOU CAN SEE IN THE IMAGE
WHEN YOU RUN THE CONFIG IT WILL DECODE THE ENCODED STRING , AND GIVES US AN LINK
SO WHEN WE DECODE , IT GIVES US AN LINK WHICH CONTAINS AN MALWARE
WHEN WE COMBINE BOTH THE DECODED STRING IT GIVES US AN LINK
AND IT RUNS AUTOMATICALLY AND DATAS WILL BE STOLEN
SO I WANT YOU GUYS TO CHECK EVERY CONFIG BEFORE RUNNING IT , IF U DONT HAVE ANY KNOWLEDGE ABOUT THE CONFIGS THEN YOU CAN USE THIS TOOL TO FIND IT OUT , WHICH CAN BE VERY HELP FULL