Overview
overview
9Static
static
7Meta Unban...er.exe
windows7-x64
9Meta Unban...er.exe
windows10-2004-x64
9Meta Unban...EL.exe
windows7-x64
9Meta Unban...EL.exe
windows10-2004-x64
9Meta Unban...er.exe
windows7-x64
9Meta Unban...er.exe
windows10-2004-x64
9Meta Unban...er.exe
windows7-x64
8Meta Unban...er.exe
windows10-2004-x64
8Meta Unban...er.exe
windows7-x64
9Meta Unban...er.exe
windows10-2004-x64
9Meta Unban...er.bat
windows7-x64
8Meta Unban...er.bat
windows10-2004-x64
8Meta Unban...er.bat
windows7-x64
1Meta Unban...er.bat
windows10-2004-x64
1Meta Unban...er.exe
windows7-x64
7Meta Unban...er.exe
windows10-2004-x64
7Meta Unban...ol.bat
windows7-x64
8Meta Unban...ol.bat
windows10-2004-x64
8Meta Unban...an.exe
windows7-x64
1Meta Unban...an.exe
windows10-2004-x64
1Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 04:50
Behavioral task
behavioral1
Sample
Meta Unban/Cleaners/AppleCleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Meta Unban/Cleaners/AppleCleaner.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Meta Unban/Cleaners/AppleS5-DEL.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Meta Unban/Cleaners/AppleS5-DEL.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Meta Unban/Cleaners/BadwareCleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Meta Unban/Cleaners/BadwareCleaner.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Meta Unban/Cleaners/BadwareDeepCleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Meta Unban/Cleaners/BadwareDeepCleaner.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Meta Unban/Cleaners/EventCleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Meta Unban/Cleaners/EventCleaner.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
Meta Unban/Cleaners/Fivem-Cleaner.bat
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Meta Unban/Cleaners/Fivem-Cleaner.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Meta Unban/Cleaners/FortniteCleaner.bat
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Meta Unban/Cleaners/FortniteCleaner.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Meta Unban/Cleaners/NXTcleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Meta Unban/Cleaners/NXTcleaner.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Meta Unban/Cleaners/full deep cleaner by nigga mhatt lol.bat
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Meta Unban/Cleaners/full deep cleaner by nigga mhatt lol.bat
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
Meta Unban/Meta Unban.exe
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
Meta Unban/Meta Unban.exe
Resource
win10v2004-20230220-en
General
-
Target
Meta Unban/Cleaners/full deep cleaner by nigga mhatt lol.bat
-
Size
902KB
-
MD5
602ac0bd731b2615933dde1442e96ff7
-
SHA1
586be9b5bb086aa301eea7df5ee998390756b912
-
SHA256
97c781dfaa813232a8d13f7dcdfd1490f355ab85823b2cd73b9dd259d3a1ad07
-
SHA512
d5cee12b3c99cae442808c463636faa0f96cdae24d6caff13fd5e27a40f74ce58cd15f43430d5ebd15d968588d491dee17bb31b3f7c19ed7d55e2882a25d30eb
-
SSDEEP
3072:kOW9mafKzoz3g8gzRnvplYSc5mzozEzoz6zozn:5ykyuykyn
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1472 cmd.exe -
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\Prefetch\READYB~1\READYB~1.ETL cmd.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1284 sc.exe -
Kills process with taskkill 40 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1600 taskkill.exe 896 taskkill.exe 1144 taskkill.exe 556 taskkill.exe 1164 taskkill.exe 1484 taskkill.exe 360 taskkill.exe 1144 taskkill.exe 1240 taskkill.exe 360 taskkill.exe 1556 taskkill.exe 1884 taskkill.exe 2036 taskkill.exe 1332 taskkill.exe 896 taskkill.exe 1884 taskkill.exe 1284 taskkill.exe 1048 taskkill.exe 1720 taskkill.exe 1240 taskkill.exe 1772 taskkill.exe 1928 taskkill.exe 1432 taskkill.exe 988 taskkill.exe 988 taskkill.exe 748 taskkill.exe 1160 taskkill.exe 1628 taskkill.exe 1628 taskkill.exe 1576 taskkill.exe 1432 taskkill.exe 1648 taskkill.exe 1572 taskkill.exe 1900 taskkill.exe 1972 taskkill.exe 1868 taskkill.exe 1928 taskkill.exe 748 taskkill.exe 520 taskkill.exe 1900 taskkill.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 268 reg.exe 556 reg.exe 984 reg.exe 1392 reg.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2036 taskkill.exe Token: SeDebugPrivilege 1972 taskkill.exe Token: SeDebugPrivilege 520 taskkill.exe Token: SeDebugPrivilege 1160 taskkill.exe Token: SeDebugPrivilege 1868 taskkill.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeDebugPrivilege 1332 taskkill.exe Token: SeDebugPrivilege 1628 taskkill.exe Token: SeDebugPrivilege 1240 taskkill.exe Token: SeDebugPrivilege 1576 taskkill.exe Token: SeDebugPrivilege 1432 taskkill.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeDebugPrivilege 1900 taskkill.exe Token: SeDebugPrivilege 360 taskkill.exe Token: SeDebugPrivilege 1928 taskkill.exe Token: SeDebugPrivilege 896 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe Token: SeDebugPrivilege 1884 taskkill.exe Token: SeDebugPrivilege 748 taskkill.exe Token: SeDebugPrivilege 1284 taskkill.exe Token: SeDebugPrivilege 556 taskkill.exe Token: SeDebugPrivilege 1164 taskkill.exe Token: SeDebugPrivilege 1048 taskkill.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 1648 taskkill.exe Token: SeDebugPrivilege 1484 taskkill.exe Token: SeDebugPrivilege 1600 taskkill.exe Token: SeDebugPrivilege 1572 taskkill.exe Token: SeDebugPrivilege 1628 taskkill.exe Token: SeDebugPrivilege 1240 taskkill.exe Token: SeDebugPrivilege 1556 taskkill.exe Token: SeDebugPrivilege 1432 taskkill.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeDebugPrivilege 1900 taskkill.exe Token: SeDebugPrivilege 360 taskkill.exe Token: SeDebugPrivilege 1928 taskkill.exe Token: SeDebugPrivilege 896 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe Token: SeDebugPrivilege 1884 taskkill.exe Token: SeDebugPrivilege 748 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exedescription pid process target process PID 1472 wrote to memory of 2036 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 2036 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 2036 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1972 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1972 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1972 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 520 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 520 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 520 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1160 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1160 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1160 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1868 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1868 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1868 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1772 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1772 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1772 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1332 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1332 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1332 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1628 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1628 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1628 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1240 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1240 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1240 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1576 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1576 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1576 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1432 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1432 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1432 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 988 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 988 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 988 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1900 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1900 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1900 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 360 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 360 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 360 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1928 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1928 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1928 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 896 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 896 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 896 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1144 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1144 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1144 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1884 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1884 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1884 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 748 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 748 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 748 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1284 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1284 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1284 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 556 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 556 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 556 1472 cmd.exe taskkill.exe PID 1472 wrote to memory of 1164 1472 cmd.exe taskkill.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Meta Unban\Cleaners\full deep cleaner by nigga mhatt lol.bat"1⤵
- Deletes itself
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:520 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\system32\taskkill.exetaskkill /f /im UnrealCEFSubProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1772 -
C:\Windows\system32\taskkill.exetaskkill /f /im CEFProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\system32\taskkill.exetaskkill /f /im BEService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1240 -
C:\Windows\system32\taskkill.exetaskkill /f /im BEServices.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\system32\taskkill.exetaskkill /f /im BattleEye.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\system32\taskkill.exetaskkill /f /im smartscreen.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:988 -
C:\Windows\system32\taskkill.exetaskkill /f /im smartscreen.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:360 -
C:\Windows\system32\taskkill.exetaskkill /f /im dnf.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1928 -
C:\Windows\system32\taskkill.exetaskkill /f /im DNF.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:896 -
C:\Windows\system32\taskkill.exetaskkill /f /im CrossProxy.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\system32\taskkill.exetaskkill /f /im tensafe_1.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Windows\system32\taskkill.exetaskkill /f /im TenSafe_1.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:748 -
C:\Windows\system32\taskkill.exetaskkill /f /im tensafe_2.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\system32\taskkill.exetaskkill /f /im tencentdl.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:556 -
C:\Windows\system32\taskkill.exetaskkill /f /im TenioDL.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Windows\system32\taskkill.exetaskkill /f /im uishell.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\system32\taskkill.exetaskkill /f /im BackgroundDownloader.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720 -
C:\Windows\system32\taskkill.exetaskkill /f /im conime.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\system32\taskkill.exetaskkill /f /im QQDL.EXE2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1484 -
C:\Windows\system32\taskkill.exetaskkill /f /im qqlogin.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Windows\system32\taskkill.exetaskkill /f /im dnfchina.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\system32\taskkill.exetaskkill /f /im dnfchinatest.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\system32\taskkill.exetaskkill /f /im dnf.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1240 -
C:\Windows\system32\taskkill.exetaskkill /f /im txplatform.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\system32\taskkill.exetaskkill /f /im TXPlatform.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\system32\taskkill.exetaskkill /f /im OriginWebHelperService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:988 -
C:\Windows\system32\taskkill.exetaskkill /f /im Origin.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\system32\taskkill.exetaskkill /f /im OriginClientService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:360 -
C:\Windows\system32\taskkill.exetaskkill /f /im OriginER.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1928 -
C:\Windows\system32\taskkill.exetaskkill /f /im OriginThinSetupInternal.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:896 -
C:\Windows\system32\taskkill.exetaskkill /f /im OriginLegacyCLI.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\system32\taskkill.exetaskkill /f /im Agent.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Windows\system32\taskkill.exetaskkill /f /im Client.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:748 -
C:\Windows\system32\sc.exeSc stop EasyAntiCheat2⤵
- Launches sc.exe
PID:1284 -
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v HwProfileGuid /t REG_SZ /d {10724-14180-31225-6636} /f2⤵
- Modifies registry key
PID:268 -
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v GUID /t REG_SZ /d {18484-871-28250-19403} /f2⤵
- Modifies registry key
PID:556 -
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v GUID /t REG_SZ /d 15560-24919-4809-20485 /f2⤵
- Modifies registry key
PID:984 -
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v MachineGuid /t REG_SZ /d 22216-11659-13518-22093 /f2⤵
- Modifies registry key
PID:1392 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:1388
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\com.epicgames.launcher" /f2⤵PID:876
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EpicGames" /f2⤵PID:1160
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Epic Games" /f2⤵PID:584
-
C:\Windows\system32\reg.exereg delete "HKEY_CLASSES_ROOT\com.epicgames.launcher" /f2⤵PID:1048
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:1868