mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-25 04:45:27 +00:00
f2ac1ece55
add
35 lines
1.2 KiB
C#
35 lines
1.2 KiB
C#
// Decompiled with JetBrains decompiler
|
|
// Type:
|
|
// Assembly: Ressource, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
|
|
// MVID: 7A61D5AB-B799-4526-BF58-A6DA1297213F
|
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Trojan.Win32.Inject.ancbn-87991063fbeea430cdbe9586022ccd45abc0d3ca50af32983044f034c3072515.exe
|
|
|
|
using System.Collections;
|
|
using System.IO;
|
|
using System.Reflection;
|
|
|
|
internal sealed class \uE00B
|
|
{
|
|
public static string \uE000(int _param0) => string.Intern(\uE00B.\uE009.\uE000.\uE000(_param0));
|
|
|
|
public static string \uE000 => "131626d8a90446728bfdd3abc017c1a2";
|
|
|
|
private sealed class \uE009
|
|
{
|
|
public static readonly \uE00B.\uE009 \uE000 = new \uE00B.\uE009();
|
|
private Hashtable \uE001;
|
|
|
|
private \uE009()
|
|
{
|
|
MemoryStream input = \uE00C.\uE000(Assembly.GetExecutingAssembly().GetManifestResourceStream(\uE00B.\uE000));
|
|
long length = input.Length;
|
|
BinaryReader binaryReader = new BinaryReader((Stream) input);
|
|
this.\uE001 = new Hashtable();
|
|
while (input.Position < length)
|
|
this.\uE001.Add((object) (int) input.Position, (object) binaryReader.ReadString());
|
|
}
|
|
|
|
public string \uE000(int _param1) => (string) this.\uE001[(object) _param1];
|
|
}
|
|
}
|