mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 19:36:11 +00:00
61 lines
1.5 KiB
C#
61 lines
1.5 KiB
C#
|
// Decompiled with JetBrains decompiler
|
|||
|
// Type: .
|
|||
|
// Assembly: AudioHD, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
|
|||
|
// MVID: A79492AA-5FAA-4ED2-ACC6-3D90AD665D99
|
|||
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan-Dropper.Win32.Sysn.awyx-36fae8d04bf5f7d873dd5aa10ad92403f80b9af8b6ef91319e70ea2c9c043024.exe
|
|||
|
|
|||
|
using System;
|
|||
|
using System.Diagnostics;
|
|||
|
using System.Runtime.InteropServices;
|
|||
|
using System.Windows.Forms;
|
|||
|
|
|||
|
namespace \u0001
|
|||
|
{
|
|||
|
internal sealed class \u0001
|
|||
|
{
|
|||
|
private static \u0001.\u0001 \u0001;
|
|||
|
private long \u0001 = DateTime.Now.Ticks;
|
|||
|
|
|||
|
[DllImport("kernel32", EntryPoint = "SetProcessWorkingSetSize")]
|
|||
|
private static extern int \u000F(
|
|||
|
IntPtr process,
|
|||
|
int minimumWorkingSetSize,
|
|||
|
int maximumWorkingSetSize);
|
|||
|
|
|||
|
private void \u000F()
|
|||
|
{
|
|||
|
try
|
|||
|
{
|
|||
|
using (Process currentProcess = Process.GetCurrentProcess())
|
|||
|
\u0001.\u0001.\u000F(currentProcess.Handle, -1, -1);
|
|||
|
}
|
|||
|
catch
|
|||
|
{
|
|||
|
}
|
|||
|
}
|
|||
|
|
|||
|
private void \u000F(object sender, EventArgs e)
|
|||
|
{
|
|||
|
long ticks = DateTime.Now.Ticks;
|
|||
|
if (ticks - this.\u0001 <= 10000000L)
|
|||
|
return;
|
|||
|
this.\u0001 = ticks;
|
|||
|
this.\u000F();
|
|||
|
}
|
|||
|
|
|||
|
private \u0001()
|
|||
|
{
|
|||
|
// ISSUE: method pointer
|
|||
|
Application.Idle += new EventHandler((object) this, __methodptr(\u000F));
|
|||
|
this.\u000F();
|
|||
|
}
|
|||
|
|
|||
|
public static void \u0010()
|
|||
|
{
|
|||
|
if (Environment.OSVersion.Platform != PlatformID.Win32NT)
|
|||
|
return;
|
|||
|
\u0001.\u0001.\u0001 = new \u0001.\u0001();
|
|||
|
}
|
|||
|
}
|
|||
|
}
|