Decompiling VB.Net assembly produces code with invalid member variable names; names starting with $STATIC$

前端 未结 3 1789
隐瞒了意图╮
隐瞒了意图╮ 2020-12-21 06:02

I am doing work for a client who has lost the source code for one of their VB.Net WinForms applications. The assembly they have is not obfuscated at all. I am trying to reco

3条回答
  •  -上瘾入骨i
    2020-12-21 06:52

    Those aren't variables, they are fields (they have access modifiers).

    They will be compiler generated fields which will be generated in a number of different circumstances. The names are purposely invalid to avoid conflicts with "normal" fields.

    If you can provide a little more context someone clever can probably figure out what the source originally looked like for the compiler to emit those fields.

提交回复
热议问题