MalwareSourceCode/MSIL/Trojan-Dropper/Win32/I/Trojan-Dropper.Win32.Injector.dmsv-fde9e07062bacdce7fa9d31f039f393916e1be165ce49510d41be6dfd2b59512/My/MyApplication.cs

59 lines
1.8 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: WindowsApplication1.My.MyApplication
// Assembly: Java Windows Environment, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 097830FC-95C1-47F2-9E79-8207C0E28B1C
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.dmsv-fde9e07062bacdce7fa9d31f039f393916e1be165ce49510d41be6dfd2b59512.exe
using Microsoft.VisualBasic.ApplicationServices;
using System;
using System.CodeDom.Compiler;
using System.Collections.Generic;
using System.ComponentModel;
using System.Diagnostics;
using System.Windows.Forms;
namespace WindowsApplication1.My
{
[EditorBrowsable(EditorBrowsableState.Never)]
[GeneratedCode("MyTemplate", "8.0.0.0")]
internal class MyApplication : WindowsFormsApplicationBase
{
private static List<WeakReference> __ENCList = new List<WeakReference>();
[DebuggerNonUserCode]
static MyApplication()
{
}
[EditorBrowsable(EditorBrowsableState.Advanced)]
[STAThread]
[DebuggerHidden]
internal static void Main(string[] Args)
{
try
{
Application.SetCompatibleTextRenderingDefault(WindowsFormsApplicationBase.UseCompatibleTextRendering);
}
finally
{
}
MyProject.Application.Run(Args);
}
[DebuggerStepThrough]
public MyApplication()
: base(AuthenticationMode.Windows)
{
lock (MyApplication.__ENCList)
MyApplication.__ENCList.Add(new WeakReference((object) this));
this.IsSingleInstance = false;
this.EnableVisualStyles = true;
this.SaveMySettingsOnExit = true;
this.ShutdownStyle = ShutdownMode.AfterAllFormsClose;
}
[DebuggerStepThrough]
protected override void OnCreateMainForm() => this.MainForm = (Form) MyProject.Forms.a;
}
}