// Decompiled with JetBrains decompiler // Type: . // Assembly: Stub, Version=2.0.0.2, Culture=neutral, PublicKeyToken=null // MVID: 18A6455A-DBC9-4D4B-8699-BEBEFCABEF8D // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Trojan.Win32.Llac.aimt-d60eebfa06f055ff7e8bef8d4507b58d2922f6e9f6682bbf0d9c0884bab4acb2.exe using System; using System.Diagnostics; using System.Runtime.InteropServices; using System.Windows.Forms; namespace \u0001 { internal sealed class \u0001 { private static \u0001.\u0001 \u0001; private long \u0001 = DateTime.Now.Ticks; [DllImport("kernel32", EntryPoint = "SetProcessWorkingSetSize")] private static extern int \u0002( IntPtr process, int minimumWorkingSetSize, int maximumWorkingSetSize); private void \u0002() { try { using (Process currentProcess = Process.GetCurrentProcess()) { if (false) return; \u0001.\u0001.\u0002(currentProcess.Handle, -1, -1); } } catch { } } private void \u0002(object sender, EventArgs e) { try { long num1 = DateTime.Now.Ticks; long num2; long num3; while (true) { num2 = num1; num3 = num2 - this.\u0001; if (false) num1 = num3; else break; } if (num3 <= 10000000L) return; this.\u0001 = num2; this.\u0002(); } catch { } } private \u0001() { Application.Idle += new EventHandler(this.\u0002); this.\u0002(); } public static void \u0003() { try { if (Environment.OSVersion.Platform != PlatformID.Win32NT) return; \u0001.\u0001.\u0001 = new \u0001.\u0001(); } catch { } } } }