shadowbrokers-exploits/windows/Resources/Ep/Scripts/ifthen/searchProcesses.epm
2017-04-14 11:45:07 +02:00

34 lines
564 B
Text

# blah
@include "ifthen\\execute.epm";
@echo off;
@case-sensitive off;
@include "_ProcessList.epm";
@include "_StringFunctions.epm";
sub searchProcesses(IN string $processes, IN string $actions)
{
int $ids;
string $names;
_GetProcessList($ids, $names);
int $size = sizeof($processes);
int $i = 0;
while($i < $size)
{
string $name;
foreach $name ($names)
{
if($processes[$i] == $name)
{
echo "match: $name";
echo "\taction: $actions[$i]";
execute($actions[$i]);
break;
}
}
$i++;
}
}