// Decompiled with JetBrains decompiler // Type: . // Assembly: WinData, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 162322D2-FE3A-45B9-99E4-3519564A1D4D // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Ransom.Win32.Blocker.kkro-82cd479bb60c59525668e5016b400a8cc48f04b14a5c6cad5e2c6046b301e79d.exe using System; using System.Diagnostics; using System.Reflection; using System.Runtime.InteropServices; namespace \u0001 { internal sealed class \u0001 { private static Assembly \u0001 = (Assembly) null; private static string[] \u0001 = new string[0]; internal static void \u0001() { try { AppDomain.CurrentDomain.ResourceResolve += new ResolveEventHandler(\u0001.\u0001.\u0001); } catch (Exception ex) { } } private static Assembly \u0001([In] object obj0, [In] ResolveEventArgs obj1) { if ((object) \u0001.\u0001.\u0001 == null) { lock (\u0001.\u0001.\u0001) { \u0001.\u0001.\u0001 = Assembly.Load("{2dc0d367-4601-4bc5-8cd4-ae3a60f57600}, PublicKeyToken=3e56350693f7355e"); if ((object) \u0001.\u0001.\u0001 != null) \u0001.\u0001.\u0001 = \u0001.\u0001.\u0001.GetManifestResourceNames(); } } string name = obj1.Name; for (int index = 0; index < \u0001.\u0001.\u0001.Length; ++index) { if (\u0001.\u0001.\u0001[index] == name) return !\u0001.\u0001.\u0001() ? (Assembly) null : \u0001.\u0001.\u0001; } return (Assembly) null; } private static bool \u0001() { try { StackFrame[] frames = new StackTrace().GetFrames(); for (int index = 2; index < frames.Length; ++index) { if ((object) frames[index].GetMethod().Module.Assembly == (object) Assembly.GetExecutingAssembly()) return true; } return false; } catch { return true; } } } }