Technical Information
- '<SYSTEM32>\taskkill.exe' /f /im HTTPDebuggerUI.exe
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq x32dbg*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq NewX.exe*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq New.exe*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq 1x.exe*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq x.exe*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq HxD*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq auto.exe*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq idaPlus*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq gidaPlus*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq x96dbg*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq x86dbg*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq idaq*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq idaq64*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq ida64*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq x64dbg*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq processhacker*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq cheatengine*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /f /im HTTPDebuggerSvc.exe
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq ollydbg*" /IM * /F /T
- '<SYSTEM32>\taskkill.exe' /FI "IMAGENAME eq fiddler*" /IM * /F /T
- nul
- %WINDIR%\temp\tar5412.tmp
- %WINDIR%\temp\cab5411.tmp
- %WINDIR%\temp\tar5383.tmp
- %WINDIR%\temp\cab5382.tmp
- %WINDIR%\temp\tar392e.tmp
- %WINDIR%\temp\cab392d.tmp
- %WINDIR%\temp\tar38af.tmp
- %WINDIR%\temp\cab38ae.tmp
- %WINDIR%\temp\tar1ff0.tmp
- %WINDIR%\temp\cab1fef.tmp
- %WINDIR%\temp\tar1ed5.tmp
- %WINDIR%\temp\cab1ed4.tmp
- %WINDIR%\temp\cab6e56.tmp
- %WINDIR%\temp\tar48f.tmp
- %WINDIR%\temp\tar401.tmp
- %WINDIR%\temp\cab400.tmp
- %WINDIR%\temp\tar3c0.tmp
- %WINDIR%\temp\cab3bf.tmp
- %WINDIR%\temp\tar322.tmp
- %WINDIR%\temp\cab321.tmp
- %WINDIR%\temp\tare91b.tmp
- %WINDIR%\temp\cabe91a.tmp
- %WINDIR%\temp\tare87d.tmp
- %WINDIR%\temp\cabe87c.tmp
- %WINDIR%\temp\tarcdda.tmp
- %WINDIR%\temp\cabcdd9.tmp
- %WINDIR%\temp\cab48e.tmp
- %WINDIR%\temp\tar6e57.tmp
- %WINDIR%\temp\cabcdd9.tmp
- %WINDIR%\temp\tar5412.tmp
- %WINDIR%\temp\cab5411.tmp
- %WINDIR%\temp\tar5383.tmp
- %WINDIR%\temp\cab5382.tmp
- %WINDIR%\temp\tar392e.tmp
- %WINDIR%\temp\cab392d.tmp
- %WINDIR%\temp\tar38af.tmp
- %WINDIR%\temp\cab38ae.tmp
- %WINDIR%\temp\tar1ff0.tmp
- %WINDIR%\temp\cab1fef.tmp
- %WINDIR%\temp\tar1ed5.tmp
- %WINDIR%\temp\cab1ed4.tmp
- %WINDIR%\temp\tar48f.tmp
- %WINDIR%\temp\cab48e.tmp
- %WINDIR%\temp\tar401.tmp
- %WINDIR%\temp\cab400.tmp
- %WINDIR%\temp\tar3c0.tmp
- %WINDIR%\temp\cab3bf.tmp
- %WINDIR%\temp\tar322.tmp
- %WINDIR%\temp\cab321.tmp
- %WINDIR%\temp\tare91b.tmp
- %WINDIR%\temp\cabe91a.tmp
- %WINDIR%\temp\tare87d.tmp
- %WINDIR%\temp\cabe87c.tmp
- %WINDIR%\temp\tarcdda.tmp
- %WINDIR%\temp\cab6e56.tmp
- %WINDIR%\temp\tar6e57.tmp
- from <Full path to file> to <Current directory>\xbmiahackno1.exe
- 'localhost':49186
- 'localhost':49188
- 'ke##uth.win':443
- 'localhost':49186
- 'localhost':49188
- 'localhost':49189
- 'ke##uth.win':443
- DNS ASK ke##uth.win
- ClassName: '' WindowName: 'IDA: Quick start'
- ClassName: '' WindowName: 'Memory Viewer'
- ClassName: '' WindowName: 'Process List'
- ClassName: '' WindowName: 'KsDumper'
- ClassName: '' WindowName: ''
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq NewX.exe*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq New.exe*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq 1x.exe*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq x.exe*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq HxD*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq auto.exe*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq idaPlus*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq gidaPlus*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq x96dbg*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /C "color b && title Error && echo SSL connect error && timeout /t 5"
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq x86dbg*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq idaq64*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq ida64*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\sc.exe' stop HTTPDebuggerPro
- '<SYSTEM32>\cmd.exe' /c sc stop HTTPDebuggerPro >nul 2>&1
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
- '<SYSTEM32>\certutil.exe' -hashfile "<Full path to file>" MD5
- '<SYSTEM32>\find.exe' /i /v "certutil"
- '<SYSTEM32>\find.exe' /i /v "md5"
- '<SYSTEM32>\cmd.exe' /c certutil -hashfile "<Full path to file>" MD5 | find /i /v "md5" | find /i /v "certutil"
- '<SYSTEM32>\cmd.exe' /c taskkill /FI "IMAGENAME eq idaq*" /IM * /F /T >nul 2>&1
- '<SYSTEM32>\timeout.exe' /t 5