MalwareSourceCode/MSIL/Virus/Win32/E/Virus.Win32.Expiro.w-69bb73081eac86b8cf86f45e33515d0095855636967076e2b593d7a30cd80a07/_TP_CALLBACK_ENVIRON.cs
2022-08-18 06:28:56 -05:00

47 lines
1.4 KiB
C#

// Decompiled with JetBrains decompiler
// Type: _TP_CALLBACK_ENVIRON
// Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
// MVID: 516D8B44-4448-4D2C-8B8E-FFBB3FFE472B
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Virus.Win32.Expiro.w-69bb73081eac86b8cf86f45e33515d0095855636967076e2b593d7a30cd80a07.exe
using Microsoft.VisualC;
using System.Runtime.CompilerServices;
using System.Runtime.InteropServices;
[MiscellaneousBits(65)]
[NativeCppClass]
[DebugInfoInPDB]
[StructLayout(LayoutKind.Sequential, Size = 32)]
internal struct _TP_CALLBACK_ENVIRON
{
[DebugInfoInPDB]
[NativeCppClass]
[MiscellaneousBits(66)]
[StructLayout(LayoutKind.Explicit, Size = 4)]
internal struct \u0024UnnamedClass\u00240xbdab38f0\u002480\u0024
{
[DebugInfoInPDB]
[NativeCppClass]
[MiscellaneousBits(65)]
[StructLayout(LayoutKind.Sequential, Size = 4)]
internal struct \u0024UnnamedClass\u00240xbdab38f0\u002481\u0024
{
}
}
[MiscellaneousBits(66)]
[DebugInfoInPDB]
[NativeCppClass]
[StructLayout(LayoutKind.Explicit, Size = 4)]
internal struct \u0024UnnamedClass\u00240xf8fbc640\u002480\u0024
{
[DebugInfoInPDB]
[MiscellaneousBits(65)]
[NativeCppClass]
[StructLayout(LayoutKind.Sequential, Size = 4)]
internal struct \u0024UnnamedClass\u00240xf8fbc640\u002481\u0024
{
}
}
}