Anonymous ID: ef4050 March 9, 2019, 7:19 p.m. No.5600562   🗄️.is 🔗kun

>>5600425

>>5600362

Keystone is part of the Wolfcreek implant and responsible for starting malicious user applications. Loaded implants never touch the file system, so there is very little forensic evidence that the process was ever ran. It always disguises as “C:\Windows\system32\svchost.exe” and can thus be detected in the Windows task manager, if the operating system is installed on another partition or in a different path.