Техническая информация
- '%WINDIR%\syswow64\taskkill.exe' /f /im HTTPDebuggerUI.exe
- '%WINDIR%\syswow64\taskkill.exe' /f /im HTTPDebuggerSvc.exe
- '%WINDIR%\syswow64\taskkill.exe' /FI "IMAGENAME eq cheatengine*" /IM * /F /T
- '%WINDIR%\syswow64\taskkill.exe' /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
- '%WINDIR%\syswow64\taskkill.exe' /FI "IMAGENAME eq processhacker*" /IM * /F /T
- ClassName: '', WindowName: 'The Wireshark Network Analyzer'
- nul
- 'localhost':49174
- 'ke##uth.com':443
- 'microsoft.com':80
- 'localhost':49174
- 'localhost':49175
- 'ke##uth.com':443
- DNS ASK ke##uth.com
- DNS ASK microsoft.com
- ClassName: '' WindowName: 'IDA: Quick start'
- ClassName: '' WindowName: 'Memory Viewer'
- ClassName: '' WindowName: 'Process List'
- ClassName: '' WindowName: 'Progress Telerik Fiddler Web Debugger'
- ClassName: '' WindowName: 'x64dbg'
- ClassName: '' WindowName: 'KsDumper'
- ClassName: '' WindowName: ''
- '%WINDIR%\syswow64\cmd.exe' /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
- '%WINDIR%\syswow64\cmd.exe' /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
- '%WINDIR%\syswow64\cmd.exe' /c sc stop HTTPDebuggerPro >nul 2>&1
- '%WINDIR%\syswow64\sc.exe' stop HTTPDebuggerPro
- '%WINDIR%\syswow64\cmd.exe' /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
- '%WINDIR%\syswow64\cmd.exe' /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
- '%WINDIR%\syswow64\cmd.exe' /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1