MalwareSourceCode/MSIL/Virus/Win32/S/Virus.Win32.Sality.sil-9eb937e4a3faa7c29e8cc85118a5c87d65f8716c89e5d1b13d7d7bc334ec8975/_0008/_0003.cs
2022-08-18 06:28:56 -05:00

64 lines
1.5 KiB
C#
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

// Decompiled with JetBrains decompiler
// Type: .
// Assembly: a5b7ee8e-cbdf-4eff-9144-efd0c433f3fe, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 97CE9FDF-0921-44CB-AE13-1E9A2A550F0F
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Virus.Win32.Sality.sil-9eb937e4a3faa7c29e8cc85118a5c87d65f8716c89e5d1b13d7d7bc334ec8975.exe
using \u0008;
using SmartAssembly.SmartExceptionsCore;
using System;
using System.Runtime.CompilerServices;
using System.Web;
using System.Windows.Forms;
namespace \u0008
{
internal sealed class \u0003
{
private static bool \u0001;
[MethodImpl(MethodImplOptions.NoInlining)]
internal static void \u0003()
{
try
{
if (\u0003.\u0001)
return;
\u0003.\u0001 = true;
try
{
int num = (int) MessageBox.Show(\u0002.\u0003(586));
}
catch
{
try
{
if (HttpContext.Current == null || HttpContext.Current.Response == null)
return;
HttpContext.Current.Response.Write(\u0002.\u0003(752));
}
catch
{
}
}
}
catch (Exception ex)
{
throw UnhandledException.\u0003(ex);
}
}
[MethodImpl(MethodImplOptions.NoInlining)]
public \u0003()
{
try
{
}
catch (Exception ex)
{
throw UnhandledException.\u0003(ex, (object) this);
}
}
}
}