// Decompiled with JetBrains decompiler // Type: _TP_CALLBACK_ENVIRON // Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 // MVID: ADE0A079-11DB-4A46-8BDE-D2A592CA8DEA // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Virus.Win32.Expiro.w-67b630ead60119692b9abbdfd8717c96904ef041127c2cae033c86b718eaa61e.exe using Microsoft.VisualC; using System.Runtime.CompilerServices; using System.Runtime.InteropServices; [MiscellaneousBits(65)] [NativeCppClass] [DebugInfoInPDB] [StructLayout(LayoutKind.Sequential, Size = 32)] internal struct _TP_CALLBACK_ENVIRON { [DebugInfoInPDB] [NativeCppClass] [MiscellaneousBits(66)] [StructLayout(LayoutKind.Explicit, Size = 4)] internal struct \u0024UnnamedClass\u00240xc9ad1ca6\u002480\u0024 { [DebugInfoInPDB] [NativeCppClass] [MiscellaneousBits(65)] [StructLayout(LayoutKind.Sequential, Size = 4)] internal struct \u0024UnnamedClass\u00240xc9ad1ca6\u002481\u0024 { } } [MiscellaneousBits(66)] [DebugInfoInPDB] [NativeCppClass] [StructLayout(LayoutKind.Explicit, Size = 4)] internal struct \u0024UnnamedClass\u00240x7907e524\u002480\u0024 { [DebugInfoInPDB] [MiscellaneousBits(65)] [NativeCppClass] [StructLayout(LayoutKind.Sequential, Size = 4)] internal struct \u0024UnnamedClass\u00240x7907e524\u002481\u0024 { } } }