Overview
overview
10Static
static
7SAMWARE/SA...ee.exe
windows10-2004-x64
5SAMWARE/SA...er.bat
windows10-2004-x64
1SAMWARE/SA...er.exe
windows10-2004-x64
9SAMWARE/SA...EL.exe
windows10-2004-x64
9SAMWARE/SA...er.exe
windows10-2004-x64
9SAMWARE/SA...er.bat
windows10-2004-x64
8SAMWARE/SA...er.bat
windows10-2004-x64
1SAMWARE/SA...er.exe
windows10-2004-x64
10SAMWARE/SA...er.exe
windows10-2004-x64
10SAMWARE/SA...er.exe
windows10-2004-x64
8SAMWARE/SA...ol.bat
windows10-2004-x64
8Analysis
-
max time kernel
26s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 01:35
Behavioral task
behavioral1
Sample
SAMWARE/SAMWARE/SAMWARE/SAMWARE-Free.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
SAMWARE/SAMWARE/SAMWARE/Serials_Checker.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
SAMWARE/SAMWARE/SAMWARE/cleaners/AppleCleaner.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
SAMWARE/SAMWARE/SAMWARE/cleaners/AppleS5-DEL.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
SAMWARE/SAMWARE/SAMWARE/cleaners/EventCleaner.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral6
Sample
SAMWARE/SAMWARE/SAMWARE/cleaners/Fivem-Cleaner.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
SAMWARE/SAMWARE/SAMWARE/cleaners/FortniteCleaner.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
SAMWARE/SAMWARE/SAMWARE/cleaners/NXTcleaner.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
SAMWARE/SAMWARE/SAMWARE/cleaners/SAMEWARECleaner.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral10
Sample
SAMWARE/SAMWARE/SAMWARE/cleaners/SAMWAREDeepCleaner.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
SAMWARE/SAMWARE/SAMWARE/cleaners/full deep cleaner by nigga mhatt lol.bat
Resource
win10v2004-20240419-en
General
-
Target
SAMWARE/SAMWARE/SAMWARE/cleaners/AppleS5-DEL.exe
-
Size
3.1MB
-
MD5
6af7ea6d60309e7a05339a72accc2074
-
SHA1
1ccfcccae4a481c29c8b142715a9dee070918df9
-
SHA256
eb8302fbd0a3eda7620c0af1728a5d151afe1648d07525862c3701fc34c36d63
-
SHA512
bd5e87af04689d7ba11f4d08dae3396de3260d0af8d5813a664bce4b4105f1721b2cbddfc3c8bfb1013f357581b2841790ae523213fa5487c9b39b12198bdc2d
-
SSDEEP
49152:WMn54uFpQJqpleSBtthqtwRTJP8fOa9pu75KEpIj4ZVCbshPW6G9VSpnZ:AJmeqt31qOaPIUEnbOePWv3gZ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AppleS5-DEL.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4964 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AppleS5-DEL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AppleS5-DEL.exe -
resource yara_rule behavioral4/memory/3532-0-0x00007FF65B630000-0x00007FF65BEED000-memory.dmp themida behavioral4/memory/3532-3-0x00007FF65B630000-0x00007FF65BEED000-memory.dmp themida behavioral4/memory/3532-2-0x00007FF65B630000-0x00007FF65BEED000-memory.dmp themida behavioral4/memory/3532-4-0x00007FF65B630000-0x00007FF65BEED000-memory.dmp themida behavioral4/memory/3532-5-0x00007FF65B630000-0x00007FF65BEED000-memory.dmp themida behavioral4/memory/3532-11-0x00007FF65B630000-0x00007FF65BEED000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AppleS5-DEL.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3532 AppleS5-DEL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct reg.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct = "Apple-7926932421305" reg.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS reg.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 8 ipconfig.exe 3368 ipconfig.exe 3300 ipconfig.exe -
Kills process with taskkill 14 IoCs
pid Process 4044 taskkill.exe 2096 taskkill.exe 4364 taskkill.exe 2516 taskkill.exe 4488 taskkill.exe 1700 taskkill.exe 2704 taskkill.exe 984 taskkill.exe 2980 taskkill.exe 4764 taskkill.exe 1344 taskkill.exe 4820 taskkill.exe 3368 taskkill.exe 3596 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\ClsidStore = 0793020072640115351252161474410597151512481887581508516049 reg.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface reg.exe -
Modifies registry key 1 TTPs 25 IoCs
pid Process 216 reg.exe 3680 reg.exe 2536 reg.exe 3956 reg.exe 2444 reg.exe 3472 reg.exe 2580 reg.exe 5072 reg.exe 1944 reg.exe 5088 reg.exe 1520 reg.exe 3304 reg.exe 2128 reg.exe 2984 reg.exe 1264 reg.exe 1868 reg.exe 4460 reg.exe 1876 reg.exe 3192 reg.exe 2416 reg.exe 4820 reg.exe 832 reg.exe 4716 reg.exe 2376 reg.exe 2544 reg.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 4820 taskkill.exe Token: SeDebugPrivilege 2980 taskkill.exe Token: SeDebugPrivilege 2516 taskkill.exe Token: SeDebugPrivilege 4488 taskkill.exe Token: SeDebugPrivilege 4044 taskkill.exe Token: SeDebugPrivilege 1700 taskkill.exe Token: SeDebugPrivilege 2704 taskkill.exe Token: SeDebugPrivilege 3368 taskkill.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 984 taskkill.exe Token: SeDebugPrivilege 1344 taskkill.exe Token: SeDebugPrivilege 2096 taskkill.exe Token: SeDebugPrivilege 3596 taskkill.exe Token: SeDebugPrivilege 4364 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 1876 3532 AppleS5-DEL.exe 84 PID 3532 wrote to memory of 1876 3532 AppleS5-DEL.exe 84 PID 3532 wrote to memory of 1672 3532 AppleS5-DEL.exe 85 PID 3532 wrote to memory of 1672 3532 AppleS5-DEL.exe 85 PID 3532 wrote to memory of 3884 3532 AppleS5-DEL.exe 86 PID 3532 wrote to memory of 3884 3532 AppleS5-DEL.exe 86 PID 3532 wrote to memory of 4860 3532 AppleS5-DEL.exe 87 PID 3532 wrote to memory of 4860 3532 AppleS5-DEL.exe 87 PID 3532 wrote to memory of 2280 3532 AppleS5-DEL.exe 88 PID 3532 wrote to memory of 2280 3532 AppleS5-DEL.exe 88 PID 2280 wrote to memory of 4820 2280 cmd.exe 89 PID 2280 wrote to memory of 4820 2280 cmd.exe 89 PID 3532 wrote to memory of 3956 3532 AppleS5-DEL.exe 91 PID 3532 wrote to memory of 3956 3532 AppleS5-DEL.exe 91 PID 3956 wrote to memory of 2980 3956 cmd.exe 92 PID 3956 wrote to memory of 2980 3956 cmd.exe 92 PID 3532 wrote to memory of 4208 3532 AppleS5-DEL.exe 93 PID 3532 wrote to memory of 4208 3532 AppleS5-DEL.exe 93 PID 4208 wrote to memory of 2516 4208 cmd.exe 94 PID 4208 wrote to memory of 2516 4208 cmd.exe 94 PID 3532 wrote to memory of 4900 3532 AppleS5-DEL.exe 95 PID 3532 wrote to memory of 4900 3532 AppleS5-DEL.exe 95 PID 4900 wrote to memory of 4488 4900 cmd.exe 96 PID 4900 wrote to memory of 4488 4900 cmd.exe 96 PID 3532 wrote to memory of 4112 3532 AppleS5-DEL.exe 97 PID 3532 wrote to memory of 4112 3532 AppleS5-DEL.exe 97 PID 4112 wrote to memory of 4044 4112 cmd.exe 98 PID 4112 wrote to memory of 4044 4112 cmd.exe 98 PID 3532 wrote to memory of 5056 3532 AppleS5-DEL.exe 99 PID 3532 wrote to memory of 5056 3532 AppleS5-DEL.exe 99 PID 5056 wrote to memory of 1700 5056 cmd.exe 100 PID 5056 wrote to memory of 1700 5056 cmd.exe 100 PID 3532 wrote to memory of 2408 3532 AppleS5-DEL.exe 101 PID 3532 wrote to memory of 2408 3532 AppleS5-DEL.exe 101 PID 2408 wrote to memory of 2704 2408 cmd.exe 102 PID 2408 wrote to memory of 2704 2408 cmd.exe 102 PID 3532 wrote to memory of 2700 3532 AppleS5-DEL.exe 103 PID 3532 wrote to memory of 2700 3532 AppleS5-DEL.exe 103 PID 2700 wrote to memory of 3368 2700 cmd.exe 104 PID 2700 wrote to memory of 3368 2700 cmd.exe 104 PID 3532 wrote to memory of 1792 3532 AppleS5-DEL.exe 105 PID 3532 wrote to memory of 1792 3532 AppleS5-DEL.exe 105 PID 1792 wrote to memory of 4764 1792 cmd.exe 106 PID 1792 wrote to memory of 4764 1792 cmd.exe 106 PID 3532 wrote to memory of 5064 3532 AppleS5-DEL.exe 107 PID 3532 wrote to memory of 5064 3532 AppleS5-DEL.exe 107 PID 5064 wrote to memory of 984 5064 cmd.exe 108 PID 5064 wrote to memory of 984 5064 cmd.exe 108 PID 3532 wrote to memory of 880 3532 AppleS5-DEL.exe 109 PID 3532 wrote to memory of 880 3532 AppleS5-DEL.exe 109 PID 880 wrote to memory of 1344 880 cmd.exe 110 PID 880 wrote to memory of 1344 880 cmd.exe 110 PID 3532 wrote to memory of 1452 3532 AppleS5-DEL.exe 111 PID 3532 wrote to memory of 1452 3532 AppleS5-DEL.exe 111 PID 1452 wrote to memory of 2096 1452 cmd.exe 112 PID 1452 wrote to memory of 2096 1452 cmd.exe 112 PID 3532 wrote to memory of 2928 3532 AppleS5-DEL.exe 113 PID 3532 wrote to memory of 2928 3532 AppleS5-DEL.exe 113 PID 2928 wrote to memory of 3596 2928 cmd.exe 114 PID 2928 wrote to memory of 3596 2928 cmd.exe 114 PID 3532 wrote to memory of 1816 3532 AppleS5-DEL.exe 115 PID 3532 wrote to memory of 1816 3532 AppleS5-DEL.exe 115 PID 1816 wrote to memory of 4364 1816 cmd.exe 116 PID 1816 wrote to memory of 4364 1816 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\SAMWARE\SAMWARE\SAMWARE\cleaners\AppleS5-DEL.exe"C:\Users\Admin\AppData\Local\Temp\SAMWARE\SAMWARE\SAMWARE\cleaners\AppleS5-DEL.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 0b2⤵PID:1876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rmdir /s /q %systemdrive%\Users\%username%\AppData\Local\Temp2⤵PID:1672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rmdir /s /q %systemdrive%\Users\%username%\AppData\Roaming\EasyAntiCheat2⤵PID:3884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im steam.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\taskkill.exetaskkill /f /im steam.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im OneDrive.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\taskkill.exetaskkill /f /im OneDrive.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKLM\SOFTWARE\WOW6432Node\EasyAntiCheat /f2⤵PID:4660
-
C:\Windows\system32\reg.exereg delete HKLM\SOFTWARE\WOW6432Node\EasyAntiCheat /f3⤵
- Modifies registry key
PID:832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKLM\SYSTEM\ControlSet001\Services\EasyAntiCheat /f2⤵PID:4920
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\ControlSet001\Services\EasyAntiCheat /f3⤵
- Modifies registry key
PID:2580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKLM\SYSTEM\ControlSet001\Services\BEService /f2⤵PID:1040
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\ControlSet001\Services\BEService /f3⤵
- Modifies registry key
PID:2128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t REG_SZ /d DESKTOP-%random% /f2⤵PID:1980
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t REG_SZ /d DESKTOP-7926 /f3⤵
- Modifies registry key
PID:216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName /v ComputerName /t REG_SZ /d DESKTOP-%random% /f2⤵PID:1984
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName /v ComputerName /t REG_SZ /d DESKTOP-7926 /f3⤵
- Modifies registry key
PID:2984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\HARDWARE\DESCRIPTION\System\BIOS /v BaseBoardProduct /t REG_SZ /d Apple-%random%%random%%random% /f2⤵PID:2956
-
C:\Windows\system32\reg.exeREG ADD HKLM\HARDWARE\DESCRIPTION\System\BIOS /v BaseBoardProduct /t REG_SZ /d Apple-7926932421305 /f3⤵
- Enumerates system info in registry
- Modifies registry key
PID:1264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v HwProfileGuid /t REG_SZ /d {Apple%random%-%random%-%random%-%random%%random%} /f >nul 2>&12⤵PID:4980
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v HwProfileGuid /t REG_SZ /d {Apple7926-9324-21305-2405614902} /f3⤵
- Modifies registry key
PID:3680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v GUID /t REG_SZ /d {Apple%random%-%random%-%random%-%random%%random%} /f2⤵PID:2400
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v GUID /t REG_SZ /d {Apple7930-20072-6401-1535125216} /f3⤵
- Modifies registry key
PID:3192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v GUID /t REG_SZ /d %random%-%random%-%random%-%random% /f2⤵PID:3212
-
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v GUID /t REG_SZ /d 7930-20072-6401-15351 /f3⤵
- Modifies registry key
PID:5072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v MachineGuid /t REG_SZ /d Apple%random%-%random%-%random%-%random% /f2⤵PID:4628
-
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v MachineGuid /t REG_SZ /d Apple7930-20072-6401-15351 /f3⤵
- Modifies registry key
PID:1520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG delete HKCU\Software\Epic" "Games /f2⤵PID:640
-
C:\Windows\system32\reg.exeREG delete HKCU\Software\Epic" "Games /f3⤵
- Modifies registry key
PID:2536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG delete HKCU\Software\Epic Games /f2⤵PID:4612
-
C:\Windows\system32\reg.exeREG delete HKCU\Software\Epic Games /f3⤵
- Modifies registry key
PID:1868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG delete HKCU\Software\Epic" "Games\Unreal" "Engine\Hardware" "Survey\HardwareSurveyFlags /f2⤵PID:1512
-
C:\Windows\system32\reg.exeREG delete HKCU\Software\Epic" "Games\Unreal" "Engine\Hardware" "Survey\HardwareSurveyFlags /f3⤵
- Modifies registry key
PID:2416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG delete HKCU\Software\Epic Games\Unreal Engine\Hardware Survey\HardwareSurveyFlags /f2⤵PID:2664
-
C:\Windows\system32\reg.exeREG delete HKCU\Software\Epic Games\Unreal Engine\Hardware Survey\HardwareSurveyFlags /f3⤵
- Modifies registry key
PID:1944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKLM\SOFTWARE\Classes\com.epicgames.launcher /f2⤵PID:5000
-
C:\Windows\system32\reg.exereg delete HKLM\SOFTWARE\Classes\com.epicgames.launcher /f3⤵
- Modifies registry key
PID:2444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKLM\SOFTWARE\WOW6432Node\EpicGames /f2⤵PID:1164
-
C:\Windows\system32\reg.exereg delete HKLM\SOFTWARE\WOW6432Node\EpicGames /f3⤵
- Modifies registry key
PID:5088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKLM\SOFTWARE\WOW6432Node\Epic" "Games /f2⤵PID:4700
-
C:\Windows\system32\reg.exereg delete HKLM\SOFTWARE\WOW6432Node\Epic" "Games /f3⤵
- Modifies registry key
PID:4460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKCR\com.epicgames.launcher /f2⤵PID:3568
-
C:\Windows\system32\reg.exereg delete HKCR\com.epicgames.launcher /f3⤵PID:1424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v SMBiosData /f2⤵PID:4344
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v SMBiosData /f3⤵
- Modifies registry key
PID:4716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKCU\Software\Classes\Interface /v ClsidStore /t REG_BINARY /d %random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random% /f2⤵PID:736
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\Interface /v ClsidStore /t REG_BINARY /d 793020072640115351252161474410597151512481887581508516049 /f3⤵
- Modifies registry class
- Modifies registry key
PID:1876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\SYSTEM\CurrentControlSet\Control\SystemInformation /v ComputerHardwareId /t REG_SZ /d Apple-%random%-%random%-%random%%random% /f2⤵PID:4576
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\SystemInformation /v ComputerHardwareId /t REG_SZ /d Apple-7930-20072-640115351 /f3⤵
- Modifies registry key
PID:2376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKLM\SYSTEM\CurrentControlSet\Control\SystemInformation /v ComputerHardwareIds /t REG_SZ /d Apple-%random%-%random%-%random%%random% /f2⤵PID:1672
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\SystemInformation /v ComputerHardwareIds /t REG_SZ /d Apple-7930-20072-640115351 /f3⤵
- Modifies registry key
PID:3304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKCU\Software\Classes\Interface /v ClsidStore /f2⤵PID:4376
-
C:\Windows\system32\reg.exereg delete HKCU\Software\Classes\Interface /v ClsidStore /f3⤵
- Modifies registry key
PID:2544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKCU\Software\Microsoft\Direct3D /v WHQLClass /t REG_BINARY /d %random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random% /f2⤵PID:3988
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Microsoft\Direct3D /v WHQLClass /t REG_BINARY /d 793020072640115351252161474410597151512481887581508516049 /f3⤵
- Modifies registry key
PID:4820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD HKCU\Software\Microsoft\Direct3D /v WHQLClass /t REG_BINARY /d %random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random% /f2⤵PID:2280
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Microsoft\Direct3D /v WHQLClass /t REG_BINARY /d 793020072640115351252161474410597151512481887581508516049 /f3⤵
- Modifies registry key
PID:3472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKCU\Software\Microsoft\Direct3D /v WHQLClass /f2⤵PID:2980
-
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Direct3D /v WHQLClass /f3⤵
- Modifies registry key
PID:3956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh winsock reset2⤵PID:1140
-
C:\Windows\system32\netsh.exenetsh winsock reset3⤵PID:3024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh int ip reset2⤵PID:1932
-
C:\Windows\system32\netsh.exenetsh int ip reset3⤵PID:4044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall reset2⤵PID:5080
-
C:\Windows\system32\netsh.exenetsh advfirewall reset3⤵
- Modifies Windows Firewall
PID:4964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵PID:4692
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:8
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /release2⤵PID:1740
-
C:\Windows\system32\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:3368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /renew2⤵PID:2700
-
C:\Windows\system32\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:3300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c arp -d2⤵PID:3064
-
C:\Windows\system32\ARP.EXEarp -d3⤵PID:4736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh interface ip delete arpcache2⤵PID:4168
-
C:\Windows\system32\netsh.exenetsh interface ip delete arpcache3⤵PID:4972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\IME\networkclean.exe2⤵PID:1344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c %systemdrive%\Windows\IME\adapters.exe2⤵PID:3984
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:4296