// Decompiled with JetBrains decompiler // Type: _TP_CALLBACK_ENVIRON // Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 // MVID: ADE0A079-11DB-4A46-8BDE-D2A592CA8DEA // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Virus.Win32.Expiro.w-1f15ee7e9f7da02b6bfb4c5a5e6484eb9fa71b82d3699c54bcc7a31794b4a66d.exe using Microsoft.VisualC; using System.Runtime.CompilerServices; using System.Runtime.InteropServices; [MiscellaneousBits(65)] [NativeCppClass] [DebugInfoInPDB] [StructLayout(LayoutKind.Sequential, Size = 32)] internal struct _TP_CALLBACK_ENVIRON { [DebugInfoInPDB] [NativeCppClass] [MiscellaneousBits(66)] [StructLayout(LayoutKind.Explicit, Size = 4)] internal struct \u0024UnnamedClass\u00240xc9ad1ca6\u002480\u0024 { [DebugInfoInPDB] [NativeCppClass] [MiscellaneousBits(65)] [StructLayout(LayoutKind.Sequential, Size = 4)] internal struct \u0024UnnamedClass\u00240xc9ad1ca6\u002481\u0024 { } } [MiscellaneousBits(66)] [DebugInfoInPDB] [NativeCppClass] [StructLayout(LayoutKind.Explicit, Size = 4)] internal struct \u0024UnnamedClass\u00240x7907e524\u002480\u0024 { [DebugInfoInPDB] [MiscellaneousBits(65)] [NativeCppClass] [StructLayout(LayoutKind.Sequential, Size = 4)] internal struct \u0024UnnamedClass\u00240x7907e524\u002481\u0024 { } } }