// Decompiled with JetBrains decompiler // Type: . // Assembly: RC4STUB, Version=1.0.0.0, Culture=neutral, PublicKeyToken=4bd99f8fe4adcd07 // MVID: DA5B8577-1DEE-425A-83B8-F58DDD172F9B // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan.Win32.Llac.ajli-ac41d99cde54e36a4e446e9c8d3aecae2cd439033b269019f516b141753fb0e6.exe using \u0001; using System; using System.Reflection; using System.Runtime.InteropServices; namespace \u0002 { internal class \u0002 { private static Assembly \u0001 = (Assembly) null; private static string[] \u0001 = new string[0]; internal static void \u0003() { try { AppDomain.CurrentDomain.ResourceResolve += new ResolveEventHandler(\u0002.\u0002.\u0003); } catch (Exception ex) { } } internal static Assembly \u0003([In] object obj0, [In] ResolveEventArgs obj1) { if ((object) \u0002.\u0002.\u0001 == null) { lock (\u0002.\u0002.\u0001) { \u0002.\u0002.\u0001 = Assembly.Load(\u0003.\u0003(222)); if ((object) \u0002.\u0002.\u0001 != null) \u0002.\u0002.\u0001 = \u0002.\u0002.\u0001.GetManifestResourceNames(); } } string name = obj1.Name; for (int index = 0; index < \u0002.\u0002.\u0001.Length; ++index) { if (\u0002.\u0002.\u0001[index] == name) return \u0002.\u0002.\u0001; } return (Assembly) null; } } }