// Decompiled with JetBrains decompiler // Type:  // Assembly: ss20, Version=1.1.1.1, Culture=neutral, PublicKeyToken=null // MVID: 4385E1A7-2FA8-4895-8952-90E8ECDFEF6F // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00002-msil\Trojan-Dropper.Win32.Dapato.awrl-32c3dc21d69dcf58806a205f7919ff769fda4c1659e61dc7d2c60838850ea6d5.exe using Microsoft.VisualBasic.ApplicationServices; using System.CodeDom.Compiler; using System.ComponentModel; [EditorBrowsable(EditorBrowsableState.Never)] [GeneratedCode("MyTemplate", "8.0.0.0")] internal sealed class \u0002 : ApplicationBase { public \u0002() { if (true) ; // ISSUE: explicit constructor call base.\u002Ector(); } }