## https://sploitus.com/exploit?id=70B553ED-A95C-579D-8675-9E90EB675173
# DRive
Just a (PoC), Combining Everything, How it Work's ? First the malware identify the Windows Version using (PEB) making the malware dynamically adapt its functionality based on the version and build of the Windows OS, If the version isn't supported, a self-deletion mechanism is activated, For a little trick, `timing_SetTimer()` sets a timer, delaying action until its expiration, as a lazy way to avoid detection. Taking a naïve approach, DRive acts as a backdoor, establishing persistence, and triggering a Local PrivEsc (LPE) `CVE-2024-26229`, And when it's all done and good, the malware transmits "beacon" signals to a command and control (C2) server.