MalwareSourceCode/MSIL/Trojan-Dropper/Win32/D/Trojan-Dropper.Win32.Dapato.awrl-32c3dc21d69dcf58806a205f7919ff769fda4c1659e61dc7d2c60838850ea6d5/_0003.cs

26 lines
787 B
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: 
// Assembly: ss20, Version=1.1.1.1, Culture=neutral, PublicKeyToken=null
// MVID: 4385E1A7-2FA8-4895-8952-90E8ECDFEF6F
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00002-msil\Trojan-Dropper.Win32.Dapato.awrl-32c3dc21d69dcf58806a205f7919ff769fda4c1659e61dc7d2c60838850ea6d5.exe
using Microsoft.VisualBasic.Devices;
using System.CodeDom.Compiler;
using System.ComponentModel;
using System.Diagnostics;
[EditorBrowsable(EditorBrowsableState.Never)]
[GeneratedCode("MyTemplate", "8.0.0.0")]
internal sealed class \u0003 : Computer
{
[DebuggerHidden]
[EditorBrowsable(EditorBrowsableState.Never)]
public \u0003()
{
if (true)
;
// ISSUE: explicit constructor call
base.\u002Ector();
}
}