C:\Users\admin\source\repos\Project2\Project2\obj\Release\Project2.pdb
Overview
overview
10Static
static
3Get-System...em.ps1
windows7-x64
3Get-System...em.ps1
windows10-2004-x64
10Get-System...nd.ps1
windows7-x64
3Get-System...nd.ps1
windows10-2004-x64
10Get-System...em.ps1
windows7-x64
3Get-System...em.ps1
windows10-2004-x64
3Get-System...em.exe
windows7-x64
8Get-System...em.exe
windows10-2004-x64
8Get-System...em.ps1
windows7-x64
3Get-System...em.ps1
windows10-2004-x64
8Get-System...ve.ps1
windows7-x64
3Get-System...ve.ps1
windows10-2004-x64
3Get-System...ec.exe
windows7-x64
1Get-System...ec.exe
windows10-2004-x64
1Get-System...64.exe
windows7-x64
1Get-System...64.exe
windows10-2004-x64
1Get-System...ve.ps1
windows7-x64
3Get-System...ve.ps1
windows10-2004-x64
3Get-System...em.ps1
windows7-x64
3Get-System...em.ps1
windows10-2004-x64
3Get-System...em.ps1
windows7-x64
3Get-System...em.ps1
windows10-2004-x64
3Get-System...en.ps1
windows7-x64
3Get-System...en.ps1
windows10-2004-x64
3Get-System...em.ps1
windows7-x64
5Get-System...em.ps1
windows10-2004-x64
5Static task
static1
Behavioral task
behavioral1
Sample
Get-System-Techniques-master/CreateProcess/Get-CreateProcessSystem.ps1
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Get-System-Techniques-master/CreateProcess/Get-CreateProcessSystem.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Get-System-Techniques-master/CreateProcess/Get-CreateProcessSystemBind.ps1
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Get-System-Techniques-master/CreateProcess/Get-CreateProcessSystemBind.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Get-System-Techniques-master/NamedPipe/GetNamedPipeSystem.ps1
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Get-System-Techniques-master/NamedPipe/GetNamedPipeSystem.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Get-System-Techniques-master/NamedPipe/NamedPipeSystem.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Get-System-Techniques-master/NamedPipe/NamedPipeSystem.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
Get-System-Techniques-master/NamedPipe/NamedPipeSystem.ps1
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Get-System-Techniques-master/NamedPipe/NamedPipeSystem.ps1
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
Get-System-Techniques-master/PrintSpoof/printspoof_interactive.ps1
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Get-System-Techniques-master/PrintSpoof/printspoof_interactive.ps1
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
Get-System-Techniques-master/PsExec/PsExec.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
Get-System-Techniques-master/PsExec/PsExec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Get-System-Techniques-master/PsExec/PsExec64.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Get-System-Techniques-master/PsExec/PsExec64.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Get-System-Techniques-master/PsExec/PsexecReflective.ps1
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
Get-System-Techniques-master/PsExec/PsexecReflective.ps1
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
Get-System-Techniques-master/ScheduledTask/Get-ScheduledTaskSystem.ps1
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
Get-System-Techniques-master/ScheduledTask/Get-ScheduledTaskSystem.ps1
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
Get-System-Techniques-master/TokenManipulation/Get-WinlogonTokenSystem.ps1
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Get-System-Techniques-master/TokenManipulation/Get-WinlogonTokenSystem.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Get-System-Techniques-master/TokenManipulation/Invoke-Token.ps1
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
Get-System-Techniques-master/TokenManipulation/Invoke-Token.ps1
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
Get-System-Techniques-master/UsoDLL/Get-UsoClientDLLSystem.ps1
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Get-System-Techniques-master/UsoDLL/Get-UsoClientDLLSystem.ps1
Resource
win10v2004-20240508-en
General
-
Target
ac3fd9953bf47da6e825d4b8df6d603d_JaffaCakes118
-
Size
1015KB
-
MD5
ac3fd9953bf47da6e825d4b8df6d603d
-
SHA1
1cf567ab8ecfef56efed4620f32859057176a218
-
SHA256
28d32c2aec13ed7ade35e46b5d2cb7695d2e6e06d473ce424a272dcf712e8eef
-
SHA512
7f4ac786b7a4b5cdc4c011e17f6ef585de7cfa8861ed14df1a6743495b1e81684192e93f9d37da3ff8f8e4f822bbb520c7b29f751752a9db370df70540ee7cf2
-
SSDEEP
24576:8pPyj4gWg4R14XI1LbtQgRDP49yoETW5tHe+JIew41E9YYYYYYYYYYYYYYYYYYYC:yPzgHI1LbCoDP49yoAWjBe9YYYYYYYYR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Get-System-Techniques-master/NamedPipe/NamedPipeSystem.exe
Files
-
ac3fd9953bf47da6e825d4b8df6d603d_JaffaCakes118.zip
-
Get-System-Techniques-master/CreateProcess/Get-CreateProcessSystem.ps1.ps1 .js
-
Get-System-Techniques-master/CreateProcess/Get-CreateProcessSystemBind.ps1.ps1
-
Get-System-Techniques-master/NamedPipe/GetNamedPipeSystem.ps1.ps1
-
Get-System-Techniques-master/NamedPipe/NamedPipeSystem.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Get-System-Techniques-master/NamedPipe/NamedPipeSystem.ps1.ps1
-
Get-System-Techniques-master/PrintSpoof/printspoof_interactive.ps1.ps1
-
Get-System-Techniques-master/PsExec/PsExec.exe.exe windows:5 windows x86 arch:x86
c1e59519b5e5d84af07afa6f5a8625f1
Code Sign
33:00:00:00:98:04:58:cb:7f:23:09:b0:9e:00:00:00:00:00:98Certificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before30/03/2016, 19:21Not After30/06/2017, 19:21SubjectCN=Microsoft Time-Stamp Service,OU=MOPR+OU=nCipher DSE ESN:7AFA-E41C-E142,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:0a:2c:79:ae:d7:79:7b:a6:ac:00:01:00:00:01:0aCertificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04/06/2015, 17:42Not After04/09/2016, 17:42SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:64:47:84:94:86:db:41:19:38:00:00:00:00:00:64Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before28/10/2015, 20:31Not After28/01/2017, 20:31SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0c:4f:c5:97:fa:40:70:59:c9:4b:35:34:f4:9b:c0:90:a1:1c:cb:4e:4e:6d:96:9a:f2:67:e1:4d:69:35:9f:71Signer
Actual PE Digest0c:4f:c5:97:fa:40:70:59:c9:4b:35:34:f4:9b:c0:90:a1:1c:cb:4e:4e:6d:96:9a:f2:67:e1:4d:69:35:9f:71Digest Algorithmsha256PE Digest Matchestrueb4:77:bc:a0:7b:c3:2e:88:63:11:99:73:bc:91:f6:a5:5f:10:40:5fSigner
Actual PE Digestb4:77:bc:a0:7b:c3:2e:88:63:11:99:73:bc:91:f6:a5:5f:10:40:5fDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
netapi32
NetServerEnum
NetApiBufferFree
ws2_32
gethostname
WSAStartup
inet_ntoa
gethostbyname
mpr
WNetCancelConnection2W
WNetAddConnection2W
kernel32
GetExitCodeProcess
ResumeThread
WaitForMultipleObjects
GetFileTime
DuplicateHandle
DisconnectNamedPipe
SetNamedPipeHandleState
TransactNamedPipe
CreateEventW
GetCurrentProcessId
GetFullPathNameW
SetFileAttributesW
GetFileAttributesW
CopyFileW
WaitNamedPipeW
SetConsoleCtrlHandler
SetConsoleTitleW
ReadConsoleW
GetVersion
SetProcessAffinityMask
ReadFile
GetConsoleScreenBufferInfo
MultiByteToWideChar
GetComputerNameW
DeleteFileW
CreateFileW
GetSystemDirectoryW
FindResourceW
LoadLibraryExW
FormatMessageA
GetTickCount
CloseHandle
WriteFile
SizeofResource
LoadResource
Sleep
WaitForSingleObject
SetEndOfFile
SetEvent
SetLastError
GetLastError
GetCurrentProcess
FreeLibrary
LockResource
SetPriorityClass
GetModuleFileNameW
GetCommandLineW
GetModuleHandleW
LoadLibraryW
GetStdHandle
GetFileType
LocalFree
LocalAlloc
GetProcAddress
FreeEnvironmentStringsW
LCMapStringW
OutputDebugStringW
HeapSize
HeapReAlloc
SetFilePointerEx
WriteConsoleW
GetEnvironmentVariableW
RaiseException
LoadLibraryExA
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
WideCharToMultiByte
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
EnterCriticalSection
LeaveCriticalSection
SetStdHandle
CreateThread
GetCurrentThreadId
ExitThread
IsDebuggerPresent
IsProcessorFeaturePresent
GetStringTypeW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetProcessHeap
FlushFileBuffers
GetConsoleCP
RtlUnwind
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
comdlg32
PrintDlgW
advapi32
LsaClose
CreateProcessAsUserW
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
OpenProcessToken
LsaEnumerateAccountRights
LsaOpenPolicy
LsaFreeMemory
SetSecurityInfo
GetSecurityInfo
LookupPrivilegeValueW
AddAccessAllowedAce
GetAce
AddAce
InitializeAcl
GetLengthSid
FreeSid
AllocateAndInitializeSid
SetTokenInformation
GetTokenInformation
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegCreateKeyW
RegCloseKey
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Get-System-Techniques-master/PsExec/PsExec64.exe.exe windows:5 windows x64 arch:x64
159d56d406180a332fbc99290f30700e
Code Sign
33:00:00:00:9d:42:68:ee:31:1c:d7:56:bd:00:00:00:00:00:9dCertificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before30/03/2016, 19:21Not After30/06/2017, 19:21SubjectCN=Microsoft Time-Stamp Service,OU=MOPR+OU=nCipher DSE ESN:148C-C4B9-2066,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:0a:2c:79:ae:d7:79:7b:a6:ac:00:01:00:00:01:0aCertificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04/06/2015, 17:42Not After04/09/2016, 17:42SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:64:47:84:94:86:db:41:19:38:00:00:00:00:00:64Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before28/10/2015, 20:31Not After28/01/2017, 20:31SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
b2:69:2f:a4:eb:9e:f8:2f:9f:81:b0:ce:59:41:7d:90:d4:e4:1e:9a:0f:3b:44:46:bb:38:47:b7:16:dc:cc:bcSigner
Actual PE Digestb2:69:2f:a4:eb:9e:f8:2f:9f:81:b0:ce:59:41:7d:90:d4:e4:1e:9a:0f:3b:44:46:bb:38:47:b7:16:dc:cc:bcDigest Algorithmsha256PE Digest Matchestrue30:c6:fd:26:33:2c:21:6a:6b:e9:02:f6:39:9e:9a:fb:2f:bc:8a:f5Signer
Actual PE Digest30:c6:fd:26:33:2c:21:6a:6b:e9:02:f6:39:9e:9a:fb:2f:bc:8a:f5Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
netapi32
NetServerEnum
NetApiBufferFree
ws2_32
WSAStartup
gethostname
inet_ntoa
gethostbyname
mpr
WNetCancelConnection2W
WNetAddConnection2W
kernel32
TransactNamedPipe
CreateEventW
GetEnvironmentVariableW
GetFullPathNameW
SetFileAttributesW
GetFileAttributesW
CopyFileW
WaitNamedPipeW
SetConsoleCtrlHandler
SetConsoleTitleW
ReadConsoleW
SetNamedPipeHandleState
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetConsoleCP
FlushFileBuffers
GetProcessHeap
RtlUnwindEx
GetStartupInfoW
TlsFree
TlsSetValue
DisconnectNamedPipe
DuplicateHandle
GetFileTime
WaitForMultipleObjects
ResumeThread
GetCurrentProcessId
GetExitCodeProcess
GetVersion
SetProcessAffinityMask
ReadFile
GetConsoleScreenBufferInfo
MultiByteToWideChar
GetComputerNameW
DeleteFileW
CreateFileW
GetSystemDirectoryW
FindResourceW
LoadLibraryExW
SetEndOfFile
FormatMessageA
GetTickCount
CloseHandle
WriteFile
SizeofResource
LoadResource
Sleep
WaitForSingleObject
SetEvent
SetLastError
GetLastError
GetCurrentProcess
FreeLibrary
LockResource
SetPriorityClass
GetModuleFileNameW
GetCommandLineW
GetModuleHandleW
LoadLibraryW
GetStdHandle
GetFileType
LocalFree
LocalAlloc
GetProcAddress
FreeEnvironmentStringsW
LCMapStringW
OutputDebugStringW
HeapSize
HeapReAlloc
SetFilePointerEx
WriteConsoleW
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
WideCharToMultiByte
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
EnterCriticalSection
LeaveCriticalSection
SetStdHandle
CreateThread
GetCurrentThreadId
ExitThread
IsDebuggerPresent
IsProcessorFeaturePresent
GetStringTypeW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
DeleteCriticalSection
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TerminateProcess
TlsAlloc
TlsGetValue
user32
SetWindowTextW
GetDlgItem
SetCursor
DialogBoxIndirectParamW
SendMessageW
GetSysColorBrush
InflateRect
LoadCursorW
LoadStringW
EndDialog
gdi32
StartPage
EndDoc
StartDocW
SetMapMode
GetDeviceCaps
EndPage
comdlg32
PrintDlgW
advapi32
InitializeAcl
CreateProcessAsUserW
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
OpenProcessToken
LsaEnumerateAccountRights
LsaOpenPolicy
LsaClose
LsaFreeMemory
SetSecurityInfo
GetSecurityInfo
LookupPrivilegeValueW
AddAccessAllowedAce
GetAce
AddAce
GetLengthSid
FreeSid
AllocateAndInitializeSid
SetTokenInformation
GetTokenInformation
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegCreateKeyW
RegCloseKey
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Get-System-Techniques-master/PsExec/PsexecReflective.ps1.ps1
-
Get-System-Techniques-master/README.md
-
Get-System-Techniques-master/ScheduledTask/Get-ScheduledTaskSystem.ps1.ps1
-
Get-System-Techniques-master/TokenManipulation/Get-WinlogonTokenSystem.ps1.ps1
-
Get-System-Techniques-master/TokenManipulation/Invoke-Token.ps1.ps1
-
Get-System-Techniques-master/UsoDLL/Get-UsoClientDLLSystem.ps1.ps1