MalwareSourceCode/MSIL/Virus/Win32/E/Virus.Win32.Expiro.w-67b630ead60119692b9abbdfd8717c96904ef041127c2cae033c86b718eaa61e/_TP_CALLBACK_ENVIRON.cs

47 lines
1.4 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: _TP_CALLBACK_ENVIRON
// Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
// MVID: ADE0A079-11DB-4A46-8BDE-D2A592CA8DEA
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Virus.Win32.Expiro.w-67b630ead60119692b9abbdfd8717c96904ef041127c2cae033c86b718eaa61e.exe
using Microsoft.VisualC;
using System.Runtime.CompilerServices;
using System.Runtime.InteropServices;
[MiscellaneousBits(65)]
[NativeCppClass]
[DebugInfoInPDB]
[StructLayout(LayoutKind.Sequential, Size = 32)]
internal struct _TP_CALLBACK_ENVIRON
{
[DebugInfoInPDB]
[NativeCppClass]
[MiscellaneousBits(66)]
[StructLayout(LayoutKind.Explicit, Size = 4)]
internal struct \u0024UnnamedClass\u00240xc9ad1ca6\u002480\u0024
{
[DebugInfoInPDB]
[NativeCppClass]
[MiscellaneousBits(65)]
[StructLayout(LayoutKind.Sequential, Size = 4)]
internal struct \u0024UnnamedClass\u00240xc9ad1ca6\u002481\u0024
{
}
}
[MiscellaneousBits(66)]
[DebugInfoInPDB]
[NativeCppClass]
[StructLayout(LayoutKind.Explicit, Size = 4)]
internal struct \u0024UnnamedClass\u00240x7907e524\u002480\u0024
{
[DebugInfoInPDB]
[MiscellaneousBits(65)]
[NativeCppClass]
[StructLayout(LayoutKind.Sequential, Size = 4)]
internal struct \u0024UnnamedClass\u00240x7907e524\u002481\u0024
{
}
}
}