// Decompiled with JetBrains decompiler // Type: _TP_CALLBACK_ENVIRON // Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 // MVID: 516D8B44-4448-4D2C-8B8E-FFBB3FFE472B // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Virus.Win32.Expiro.w-69bb73081eac86b8cf86f45e33515d0095855636967076e2b593d7a30cd80a07.exe using Microsoft.VisualC; using System.Runtime.CompilerServices; using System.Runtime.InteropServices; [MiscellaneousBits(65)] [NativeCppClass] [DebugInfoInPDB] [StructLayout(LayoutKind.Sequential, Size = 32)] internal struct _TP_CALLBACK_ENVIRON { [DebugInfoInPDB] [NativeCppClass] [MiscellaneousBits(66)] [StructLayout(LayoutKind.Explicit, Size = 4)] internal struct \u0024UnnamedClass\u00240xbdab38f0\u002480\u0024 { [DebugInfoInPDB] [NativeCppClass] [MiscellaneousBits(65)] [StructLayout(LayoutKind.Sequential, Size = 4)] internal struct \u0024UnnamedClass\u00240xbdab38f0\u002481\u0024 { } } [MiscellaneousBits(66)] [DebugInfoInPDB] [NativeCppClass] [StructLayout(LayoutKind.Explicit, Size = 4)] internal struct \u0024UnnamedClass\u00240xf8fbc640\u002480\u0024 { [DebugInfoInPDB] [MiscellaneousBits(65)] [NativeCppClass] [StructLayout(LayoutKind.Sequential, Size = 4)] internal struct \u0024UnnamedClass\u00240xf8fbc640\u002481\u0024 { } } }