From 18145
>>14342398 (pb), >>14342411 (pb) this nigga spittin'
It's some C# code that was dropped by McAffee? I don't really know the details. I compiled this and ran it locally. It's a program to encrypt/decrypt base64 encoded strings using a custom System.Security.Aes implementation. It uses some interesting things as keys.
-MD5 hash = "Q Society" = 346257E94DA2E0D0D0F54AA397D291F0
This hash matches this
>Contingency Protocol 44924 https://opensea.io/collection/contingency-protocol-44924
Uses several testkeys to decrypt base64 encoded data.
-testkey0 = "rustyshackleford"
-testkey1 = "Q H7^PZBVTpZ7302"
-testkey2 = HexStringToByteArray("978ea96f-2740-4ea6-b1d0-288f11a48ff7".Replace("-", ""))
This last testkey is a HexString from a filename broken link https://www.britbonglogpost.com/978ea96f-2740-4ea6-b1d0-288f11a48ff7.jpg
https://www.iatkos.in/2021/07/whackd-second-important-step.html#978ea96f-2740-4ea6-b1d0-288f11a48ff7
https://1.bp.blogspot.com/-TCfZIcbDvag/YPqj4gkygTI/AAAAAAAAADY/efdp4_LYG2ATBwKRHo5R13lD2QyTDrNKACLcBGAsYHQ/s0/978ea96f-2740-4ea6-b1d0-288f11a48ff7.jpeg
Data it's trying to decode base64 encoded data. links from the source code:
>https://opensea.io/assets/0x495f947276749ce646f68ac8c248420045cb7b5e/42715653451494116278904116357368839356782358833774246712130390239617933639681
epsilon_b64 = "mbhD5klu/+mMNw6nN8bmE7+m4MWKp9ZMzO61R83YPGc23pCnwNXl6XnRPizFWi+k35YtNRsXiT20P7KNiV6Bz/jwBGq3PjQv2Zd14gORArKA6Cz30JEU9Sa6GGCEpJIufbFJuWWxaI9NTnGCrshcDDvIne9DvhwSTvcJHMOCAkeBNiRwxb/tCK17mclpwgV1fKXDhrCfzddOW2bTO14c0w=="
>https://opensea.io/assets/0x495f947276749ce646f68ac8c248420045cb7b5e/42715653451494116278904116357368839356782358833774246712130390238518422011905
omega_b64 = "QWIn8NzJMuDZIfibj/MqK1CPK32YXf3KuzCsf4HohUPSmUgyqAdY6moE98U6v3wVGTu2g1+ZziW+tqk9cVif41v+GC91bgnym7NlX9URAY/LLE9X9amJw3Qxa4PyNWat/dVkEOUFoa3vAE6TCVgk/gfWzB8085VW7A6hBcoR0D1tv9U5HrylObyNdm2I6ljim5XVXA9XRkLKffQReXWkAS7R34IQYsipc9jOaf/LlaCPputybuz5cKWaq/q6kbRksksbPL6v4F/omjkBHOJiqWxKHRkEgSIOEEEgIQHqk5h5Tnf7O7I5/eyDXGPAYBS2I7IwMmykLp7CG9nFLg5FDHmNgQZD4vOFrJcjoYcH3mg="
The program decrypts epsilon_b64 using the 3 different test keys. I have edited the program to decrypt the omega_b64 value as well as the original epsilon_b64, and output those values in the same way. I need to play around with it some more to try encrypting and decrypting some known values to make sure it's working.