MalwareSourceCode/MSIL/Trojan/Win32/I/Trojan.Win32.Inject.ancbn-87991063fbeea430cdbe9586022ccd45abc0d3ca50af32983044f034c3072515/.cs
2022-08-18 06:28:56 -05:00

35 lines
1.2 KiB
C#

// Decompiled with JetBrains decompiler
// Type: 
// Assembly: Ressource, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 7A61D5AB-B799-4526-BF58-A6DA1297213F
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Trojan.Win32.Inject.ancbn-87991063fbeea430cdbe9586022ccd45abc0d3ca50af32983044f034c3072515.exe
using System.Collections;
using System.IO;
using System.Reflection;
internal sealed class \uE00B
{
public static string \uE000(int _param0) => string.Intern(\uE00B.\uE009.\uE000.\uE000(_param0));
public static string \uE000 => "131626d8a90446728bfdd3abc017c1a2";
private sealed class \uE009
{
public static readonly \uE00B.\uE009 \uE000 = new \uE00B.\uE009();
private Hashtable \uE001;
private \uE009()
{
MemoryStream input = \uE00C.\uE000(Assembly.GetExecutingAssembly().GetManifestResourceStream(\uE00B.\uE000));
long length = input.Length;
BinaryReader binaryReader = new BinaryReader((Stream) input);
this.\uE001 = new Hashtable();
while (input.Position < length)
this.\uE001.Add((object) (int) input.Position, (object) binaryReader.ReadString());
}
public string \uE000(int _param1) => (string) this.\uE001[(object) _param1];
}
}