Technical Information
- '<SYSTEM32>\taskkill.exe' /f /im HTTPDebuggerUI.exe
- '<SYSTEM32>\taskkill.exe' /f /im HTTPDebuggerSvc.exe
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq cheatengine*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq processhacker*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /f /im epicgameslauncher.exe
- '<SYSTEM32>\taskkill.exe' /f /im EpicWebHelper.exe
- '<SYSTEM32>\taskkill.exe' /f /im FortniteClient - Win64 - Shipping_EAC.exe
- '<SYSTEM32>\taskkill.exe' /f /im FortniteClient - Win64 - Shipping_BE.exe
- '<SYSTEM32>\taskkill.exe' /f /im FortniteLauncher.exe
- '<SYSTEM32>\taskkill.exe' /f /im FortniteClient - Win64 - Shipping.exe
- '<SYSTEM32>\taskkill.exe' /f /im EasyAntiCheat.exe
- '<SYSTEM32>\taskkill.exe' /f /im BEService.exe
- '<SYSTEM32>\taskkill.exe' /f /im BEServices.exe
- '<SYSTEM32>\taskkill.exe' /f /im BattleEye.exe
- nul
- %WINDIR%\temp\tar26b0.tmp
- %WINDIR%\temp\cab26af.tmp
- %WINDIR%\temp\tar2640.tmp
- %WINDIR%\temp\cab2630.tmp
- %WINDIR%\temp\tar108d.tmp
- %WINDIR%\temp\cab108c.tmp
- %WINDIR%\temp\tar100e.tmp
- %WINDIR%\temp\cab100d.tmp
- %WINDIR%\temp\tarfa7a.tmp
- %WINDIR%\temp\cabfa79.tmp
- %WINDIR%\temp\tarfa1a.tmp
- %WINDIR%\temp\cabfa19.tmp
- %WINDIR%\temp\tare476.tmp
- %WINDIR%\temp\cabe475.tmp
- %WINDIR%\temp\cab3cd0.tmp
- %WINDIR%\temp\tare407.tmp
- %WINDIR%\temp\tarce82.tmp
- %WINDIR%\temp\cabce81.tmp
- %WINDIR%\temp\tarce22.tmp
- %WINDIR%\temp\cabce21.tmp
- %WINDIR%\temp\tarb86f.tmp
- %WINDIR%\temp\cabb85e.tmp
- %WINDIR%\temp\tarb800.tmp
- %WINDIR%\temp\cabb7ff.tmp
- %WINDIR%\temp\tara26b.tmp
- %WINDIR%\temp\caba26a.tmp
- %WINDIR%\temp\tara20b.tmp
- %WINDIR%\temp\caba20a.tmp
- %WINDIR%\temp\tar8b4f.tmp
- %WINDIR%\temp\cab8b4e.tmp
- %WINDIR%\temp\cabe406.tmp
- %WINDIR%\temp\tar3cd1.tmp
- %WINDIR%\temp\cab8b4e.tmp
- %WINDIR%\temp\tar26b0.tmp
- %WINDIR%\temp\cab26af.tmp
- %WINDIR%\temp\tar2640.tmp
- %WINDIR%\temp\cab2630.tmp
- %WINDIR%\temp\tar108d.tmp
- %WINDIR%\temp\cab108c.tmp
- %WINDIR%\temp\tar100e.tmp
- %WINDIR%\temp\cab100d.tmp
- %WINDIR%\temp\tarfa7a.tmp
- %WINDIR%\temp\cabfa79.tmp
- %WINDIR%\temp\tarfa1a.tmp
- %WINDIR%\temp\cabfa19.tmp
- %WINDIR%\temp\tare476.tmp
- %WINDIR%\temp\cabe475.tmp
- %WINDIR%\temp\tare407.tmp
- %WINDIR%\temp\cabe406.tmp
- %WINDIR%\temp\tarce82.tmp
- %WINDIR%\temp\cabce81.tmp
- %WINDIR%\temp\tarce22.tmp
- %WINDIR%\temp\cabce21.tmp
- %WINDIR%\temp\tarb86f.tmp
- %WINDIR%\temp\cabb85e.tmp
- %WINDIR%\temp\tarb800.tmp
- %WINDIR%\temp\cabb7ff.tmp
- %WINDIR%\temp\tara26b.tmp
- %WINDIR%\temp\caba26a.tmp
- %WINDIR%\temp\tara20b.tmp
- %WINDIR%\temp\caba20a.tmp
- %WINDIR%\temp\tar8b4f.tmp
- %WINDIR%\temp\cab3cd0.tmp
- %WINDIR%\temp\tar3cd1.tmp
- 'localhost':49186
- 'localhost':49188
- 'ke##uth.win':443
- 'x1.#.lencr.org':80
- http://x1.#.lencr.org/
- 'localhost':49186
- 'localhost':49188
- 'localhost':49189
- 'ke##uth.win':443
- DNS ASK ke##uth.win
- DNS ASK x1.#.lencr.org
- ClassName: '' WindowName: ''
- ClassName: '' WindowName: 'IDA: Quick start'
- ClassName: '' WindowName: 'Memory Viewer'
- ClassName: '' WindowName: 'Process List'
- ClassName: '' WindowName: 'KsDumper'
- ClassName: '' WindowName: 'HTTP Debugger'
- ClassName: '' WindowName: 'OllyDbg'
- ClassName: 'CabinetWClass' WindowName: ''
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
- '<SYSTEM32>\certutil.exe' -hashfile "<Full path to file>" MD5
- '<SYSTEM32>\cmd.exe' /c certutil -hashfile "<Full path to file>" MD5 | find /i /v "md5" | find /i /v "certutil"
- '<SYSTEM32>\cmd.exe' /c cls
- '<SYSTEM32>\sc.exe' stop EasyAntiCheat
- '<SYSTEM32>\cmd.exe' /c sc stop EasyAntiCheat
- '<SYSTEM32>\sc.exe' stop BattlEye Service
- '<SYSTEM32>\cmd.exe' /c sc stop BattlEye Service
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im BattleEye.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im BEServices.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im BEService.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im EasyAntiCheat.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im FortniteClient - Win64 - Shipping.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im FortniteLauncher.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im FortniteClient - Win64 - Shipping_BE.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im FortniteClient - Win64 - Shipping_EAC.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im EpicWebHelper.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im epicgameslauncher.exe > nul
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\sc.exe' stop HTTPDebuggerPro
- '<SYSTEM32>\cmd.exe' /c sc stop HTTPDebuggerPro >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
- '<SYSTEM32>\find.exe' /i /v "md5"
- '<SYSTEM32>\find.exe' /i /v "certutil"