mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-19 09:56:10 +00:00
78 lines
2.7 KiB
C#
78 lines
2.7 KiB
C#
|
// Decompiled with JetBrains decompiler
|
|||
|
// Type: Microsoft.InfoCards.CheckStoreFileValidityRequest
|
|||
|
// Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
|
|||
|
// MVID: 516D8B44-4448-4D2C-8B8E-FFBB3FFE472B
|
|||
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Virus.Win32.Expiro.w-69bb73081eac86b8cf86f45e33515d0095855636967076e2b593d7a30cd80a07.exe
|
|||
|
|
|||
|
using Microsoft.InfoCards.Diagnostics;
|
|||
|
using System;
|
|||
|
using System.IO;
|
|||
|
using System.Text;
|
|||
|
using System.Xml;
|
|||
|
using System.Xml.Schema;
|
|||
|
|
|||
|
namespace Microsoft.InfoCards
|
|||
|
{
|
|||
|
internal class CheckStoreFileValidityRequest : UIAgentRequest
|
|||
|
{
|
|||
|
private string m_filename;
|
|||
|
private bool m_valid = true;
|
|||
|
|
|||
|
public CheckStoreFileValidityRequest(
|
|||
|
IntPtr rpcHandle,
|
|||
|
Stream inArgs,
|
|||
|
Stream outArgs,
|
|||
|
ClientUIRequest parent)
|
|||
|
: base(rpcHandle, inArgs, outArgs, parent)
|
|||
|
{
|
|||
|
}
|
|||
|
|
|||
|
protected override void OnInitializeAsSystem() => base.OnInitializeAsSystem();
|
|||
|
|
|||
|
protected override void OnMarshalInArgs() => this.m_filename = Utility.DeserializeString((BinaryReader) new InfoCardBinaryReader(this.InArgs, Encoding.Unicode));
|
|||
|
|
|||
|
protected override void OnProcess()
|
|||
|
{
|
|||
|
try
|
|||
|
{
|
|||
|
try
|
|||
|
{
|
|||
|
using (FileStream fileStream = File.OpenRead(this.m_filename))
|
|||
|
{
|
|||
|
XmlReaderSettings defaultReaderSettings = InfoCardSchemas.CreateDefaultReaderSettings();
|
|||
|
defaultReaderSettings.IgnoreWhitespace = false;
|
|||
|
using (XmlReader reader = InfoCardSchemas.CreateReader((Stream) fileStream, defaultReaderSettings))
|
|||
|
{
|
|||
|
if (reader.IsStartElement("EncryptedStore", "http://schemas.xmlsoap.org/ws/2005/05/identity"))
|
|||
|
return;
|
|||
|
this.m_valid = false;
|
|||
|
}
|
|||
|
}
|
|||
|
}
|
|||
|
catch (XmlSchemaValidationException ex)
|
|||
|
{
|
|||
|
throw InfoCardTrace.ThrowHelperError((Exception) new ImportException(SR.GetString("SchemaValidationFailed"), (Exception) ex));
|
|||
|
}
|
|||
|
catch (UnauthorizedAccessException ex)
|
|||
|
{
|
|||
|
throw InfoCardTrace.ThrowHelperError((Exception) new ImportException(SR.GetString("ImportInaccesibleFile"), (Exception) ex));
|
|||
|
}
|
|||
|
catch (IOException ex)
|
|||
|
{
|
|||
|
throw InfoCardTrace.ThrowHelperError((Exception) new ImportException(SR.GetString("InvalidImportFile"), (Exception) ex));
|
|||
|
}
|
|||
|
catch (XmlException ex)
|
|||
|
{
|
|||
|
throw InfoCardTrace.ThrowHelperError((Exception) new ImportException(SR.GetString("InvalidImportFile"), (Exception) ex));
|
|||
|
}
|
|||
|
}
|
|||
|
catch (ImportException ex)
|
|||
|
{
|
|||
|
this.m_valid = false;
|
|||
|
}
|
|||
|
}
|
|||
|
|
|||
|
protected override void OnMarshalOutArgs() => new BinaryWriter(this.OutArgs).Write(this.m_valid);
|
|||
|
}
|
|||
|
}
|