// Decompiled with JetBrains decompiler // Type: INetFwIcmpSettings // Assembly: PMSInstallInit, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null // MVID: 1143B458-69F7-4F72-9059-A13F9AB730BC // Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Virus.Win32.Sality.sil-66a8bf80b7d1c03c218a77899ddc10c75b21c3784127eb96343f22ad5b31b4d6.exe using System.Runtime.InteropServices; [TypeLibType(4160)] [Guid("A6207B2E-7CDD-426A-951E-5E1CBC5AFEAD")] [ComImport] public interface INetFwIcmpSettings { [DispId(1)] bool AllowOutboundDestinationUnreachable { [DispId(1)] get; [DispId(1)] set; } [DispId(2)] bool AllowRedirect { [DispId(2)] get; [DispId(2)] set; } [DispId(3)] bool AllowInboundEchoRequest { [DispId(3)] get; [DispId(3)] set; } [DispId(4)] bool AllowOutboundTimeExceeded { [DispId(4)] get; [DispId(4)] set; } [DispId(5)] bool AllowOutboundParameterProblem { [DispId(5)] get; [DispId(5)] set; } [DispId(6)] bool AllowOutboundSourceQuench { [DispId(6)] get; [DispId(6)] set; } [DispId(7)] bool AllowInboundRouterRequest { [DispId(7)] get; [DispId(7)] set; } [DispId(8)] bool AllowInboundTimestampRequest { [DispId(8)] get; [DispId(8)] set; } [DispId(9)] bool AllowInboundMaskRequest { [DispId(9)] get; [DispId(9)] set; } [DispId(10)] bool AllowOutboundPacketTooBig { [DispId(10)] get; [DispId(10)] set; } }