Analysis
-
max time kernel
19s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 06:57
Static task
static1
General
-
Target
CS2Cheat.exe
-
Size
5.7MB
-
MD5
920f3ec2a3fe3557e067f5cef16235f8
-
SHA1
30a82dc93b0d235d618f44a94bcd092791821912
-
SHA256
bd0976acd920ba7eedaad30f8834062856da10b46bf6c8ad9312fb3fdacddb8e
-
SHA512
0fc2e8ee35c4e56efc1bfded2803474881b3b29d4b01c80a600aff36a002a63108fa6e200100e0e1866ce58fd3040188949f00968802430d4e9f9e5c1eced681
-
SSDEEP
98304:SBfkDxFCuc+TThUj1lmFHKDWKkcdwYCQ0HGrDfEWOGa5YZUI692IWOgCheFezwjz:SRkzbc+vOjzpW27CzED8WiAV6Il8eZjz
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1299080733079375894/hrEkdZRiNfD_2CydV4FCra9Yr1O879zBhe-K5U4ievQAChYclaabDINuCDCfyjlfFnOg
Signatures
-
Detect Umbral payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Umbral1.exe family_umbral behavioral1/memory/2420-13-0x0000021C30280000-0x0000021C302C0000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 64 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2616 powershell.exe 1468 powershell.exe 4496 3152 3664 3472 1136 660 powershell.exe 5032 4692 4268 1128 2480 3040 2392 powershell.exe 3672 powershell.exe 4656 powershell.exe 3000 powershell.exe 3280 powershell.exe 4628 powershell.exe 1696 4964 2104 4436 powershell.exe 1464 3332 4904 212 3040 powershell.exe 4180 2692 5048 powershell.exe 3124 4948 3416 1684 powershell.exe 3544 powershell.exe 3668 powershell.exe 4916 powershell.exe 4216 3016 1656 3792 4612 3612 powershell.exe 1656 powershell.exe 4916 powershell.exe 4700 powershell.exe 1216 powershell.exe 3436 1472 776 powershell.exe 4536 powershell.exe 3704 3736 2264 4600 powershell.exe 4516 powershell.exe 960 powershell.exe 4948 3548 4628 powershell.exe 4440 3248 -
Drops file in Drivers directory 3 IoCs
Processes:
Umbral1.exeUmbral1.exeUmbral1.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral1.exe File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral1.exe File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral1.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CS2Cheat.exe -
Executes dropped EXE 64 IoCs
Processes:
CS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeUmbral1.exepid process 1684 CS2Cheat.exe 2420 Umbral1.exe 3192 CS2Cheat.exe 2716 Umbral1.exe 2292 CS2Cheat.exe 4136 Umbral1.exe 3676 CS2Cheat.exe 4260 Umbral1.exe 1484 CS2Cheat.exe 2236 Umbral1.exe 5036 CS2Cheat.exe 2984 Umbral1.exe 2396 CS2Cheat.exe 2732 Umbral1.exe 4220 CS2Cheat.exe 4912 Umbral1.exe 2660 CS2Cheat.exe 2232 Umbral1.exe 2972 CS2Cheat.exe 1852 Umbral1.exe 5032 CS2Cheat.exe 4336 Umbral1.exe 4536 CS2Cheat.exe 3560 Umbral1.exe 2116 CS2Cheat.exe 3120 Umbral1.exe 3260 CS2Cheat.exe 4244 Umbral1.exe 4852 CS2Cheat.exe 5080 Umbral1.exe 2888 CS2Cheat.exe 2208 Umbral1.exe 4624 CS2Cheat.exe 3700 Umbral1.exe 4140 CS2Cheat.exe 4076 Umbral1.exe 3960 CS2Cheat.exe 1472 Umbral1.exe 64 CS2Cheat.exe 1388 Umbral1.exe 4936 CS2Cheat.exe 4160 Umbral1.exe 4244 CS2Cheat.exe 776 Umbral1.exe 2736 CS2Cheat.exe 4700 Umbral1.exe 384 CS2Cheat.exe 1460 Umbral1.exe 1452 CS2Cheat.exe 4216 Umbral1.exe 2600 CS2Cheat.exe 1248 Umbral1.exe 720 CS2Cheat.exe 2196 Umbral1.exe 632 CS2Cheat.exe 3208 Umbral1.exe 4540 CS2Cheat.exe 2256 Umbral1.exe 4056 CS2Cheat.exe 2944 Umbral1.exe 1812 CS2Cheat.exe 3676 Umbral1.exe 2116 CS2Cheat.exe 4440 Umbral1.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 50 IoCs
Processes:
flow ioc 154 discord.com 171 discord.com 183 discord.com 202 discord.com 39 discord.com 50 discord.com 105 discord.com 104 discord.com 143 discord.com 155 discord.com 189 discord.com 25 discord.com 86 discord.com 92 discord.com 201 discord.com 40 discord.com 57 discord.com 99 discord.com 111 discord.com 128 discord.com 129 discord.com 136 discord.com 142 discord.com 49 discord.com 65 discord.com 98 discord.com 162 discord.com 177 discord.com 172 discord.com 184 discord.com 195 discord.com 196 discord.com 213 discord.com 58 discord.com 119 discord.com 149 discord.com 163 discord.com 208 discord.com 214 discord.com 26 discord.com 64 discord.com 137 discord.com 207 discord.com 87 discord.com 93 discord.com 178 discord.com 190 discord.com 112 discord.com 120 discord.com 148 discord.com -
Looks up external IP address via web service 25 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 140 ip-api.com 169 ip-api.com 175 ip-api.com 181 ip-api.com 187 ip-api.com 37 ip-api.com 102 ip-api.com 134 ip-api.com 199 ip-api.com 211 ip-api.com 55 ip-api.com 83 ip-api.com 115 ip-api.com 126 ip-api.com 146 ip-api.com 152 ip-api.com 193 ip-api.com 205 ip-api.com 22 ip-api.com 47 ip-api.com 90 ip-api.com 160 ip-api.com 62 ip-api.com 96 ip-api.com 109 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
CS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CS2Cheat.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 50 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEPING.EXEcmd.exePING.EXEcmd.exePING.EXEPING.EXEcmd.exePING.EXEcmd.exePING.EXEcmd.execmd.execmd.exePING.EXEcmd.exePING.EXEcmd.exePING.EXEpid process 2556 cmd.exe 4680 PING.EXE 4400 1512 4428 1936 PING.EXE 1400 cmd.exe 1452 PING.EXE 4268 3688 3192 2236 cmd.exe 4160 PING.EXE 2308 4932 2892 4912 4416 3940 PING.EXE 2116 cmd.exe 428 PING.EXE 3276 680 1576 1468 3924 cmd.exe 768 1060 2344 720 2856 2576 4056 PING.EXE 996 3196 4420 cmd.exe 2944 cmd.exe 1868 4056 2992 4700 cmd.exe 3220 PING.EXE 1716 cmd.exe 868 1396 2940 1120 364 PING.EXE 3512 cmd.exe 3096 PING.EXE -
Detects videocard installed 1 TTPs 25 IoCs
Uses WMIC.exe to determine videocard installed.
Processes:
wmic.exewmic.exewmic.exewmic.exewmic.exewmic.exewmic.exewmic.exewmic.exewmic.exepid process 5012 wmic.exe 1884 4628 4388 1712 1636 2992 wmic.exe 4060 wmic.exe 3708 wmic.exe 4628 wmic.exe 1452 3444 5112 4092 3672 wmic.exe 2760 wmic.exe 3208 4160 2756 2760 wmic.exe 1060 wmic.exe 1000 wmic.exe 1444 2552 4252 -
Runs ping.exe 1 TTPs 25 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3096 PING.EXE 4680 PING.EXE 4160 PING.EXE 1396 2992 680 720 3220 PING.EXE 1468 1936 PING.EXE 1452 PING.EXE 768 4268 3192 3940 PING.EXE 4056 2308 2576 4056 PING.EXE 428 PING.EXE 4400 1060 4428 4912 364 PING.EXE -
Suspicious behavior: EnumeratesProcesses 41 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2392 powershell.exe 2392 powershell.exe 4600 powershell.exe 4600 powershell.exe 4916 powershell.exe 4916 powershell.exe 3896 powershell.exe 3896 powershell.exe 3972 powershell.exe 3972 powershell.exe 3972 powershell.exe 4436 powershell.exe 4436 powershell.exe 4436 powershell.exe 1684 powershell.exe 1684 powershell.exe 1684 powershell.exe 3544 powershell.exe 3544 powershell.exe 3544 powershell.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 4700 powershell.exe 4700 powershell.exe 4700 powershell.exe 3672 powershell.exe 3672 powershell.exe 3672 powershell.exe 1216 powershell.exe 1216 powershell.exe 1216 powershell.exe 4048 powershell.exe 4048 powershell.exe 4048 powershell.exe 2172 powershell.exe 2172 powershell.exe 2172 powershell.exe 3612 powershell.exe 3612 powershell.exe 3612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Umbral1.exepowershell.exepowershell.exepowershell.exepowershell.exewmic.exewmic.exedescription pid process Token: SeDebugPrivilege 2420 Umbral1.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeDebugPrivilege 4916 powershell.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeIncreaseQuotaPrivilege 1620 wmic.exe Token: SeSecurityPrivilege 1620 wmic.exe Token: SeTakeOwnershipPrivilege 1620 wmic.exe Token: SeLoadDriverPrivilege 1620 wmic.exe Token: SeSystemProfilePrivilege 1620 wmic.exe Token: SeSystemtimePrivilege 1620 wmic.exe Token: SeProfSingleProcessPrivilege 1620 wmic.exe Token: SeIncBasePriorityPrivilege 1620 wmic.exe Token: SeCreatePagefilePrivilege 1620 wmic.exe Token: SeBackupPrivilege 1620 wmic.exe Token: SeRestorePrivilege 1620 wmic.exe Token: SeShutdownPrivilege 1620 wmic.exe Token: SeDebugPrivilege 1620 wmic.exe Token: SeSystemEnvironmentPrivilege 1620 wmic.exe Token: SeRemoteShutdownPrivilege 1620 wmic.exe Token: SeUndockPrivilege 1620 wmic.exe Token: SeManageVolumePrivilege 1620 wmic.exe Token: 33 1620 wmic.exe Token: 34 1620 wmic.exe Token: 35 1620 wmic.exe Token: 36 1620 wmic.exe Token: SeIncreaseQuotaPrivilege 1620 wmic.exe Token: SeSecurityPrivilege 1620 wmic.exe Token: SeTakeOwnershipPrivilege 1620 wmic.exe Token: SeLoadDriverPrivilege 1620 wmic.exe Token: SeSystemProfilePrivilege 1620 wmic.exe Token: SeSystemtimePrivilege 1620 wmic.exe Token: SeProfSingleProcessPrivilege 1620 wmic.exe Token: SeIncBasePriorityPrivilege 1620 wmic.exe Token: SeCreatePagefilePrivilege 1620 wmic.exe Token: SeBackupPrivilege 1620 wmic.exe Token: SeRestorePrivilege 1620 wmic.exe Token: SeShutdownPrivilege 1620 wmic.exe Token: SeDebugPrivilege 1620 wmic.exe Token: SeSystemEnvironmentPrivilege 1620 wmic.exe Token: SeRemoteShutdownPrivilege 1620 wmic.exe Token: SeUndockPrivilege 1620 wmic.exe Token: SeManageVolumePrivilege 1620 wmic.exe Token: 33 1620 wmic.exe Token: 34 1620 wmic.exe Token: 35 1620 wmic.exe Token: 36 1620 wmic.exe Token: SeIncreaseQuotaPrivilege 3756 wmic.exe Token: SeSecurityPrivilege 3756 wmic.exe Token: SeTakeOwnershipPrivilege 3756 wmic.exe Token: SeLoadDriverPrivilege 3756 wmic.exe Token: SeSystemProfilePrivilege 3756 wmic.exe Token: SeSystemtimePrivilege 3756 wmic.exe Token: SeProfSingleProcessPrivilege 3756 wmic.exe Token: SeIncBasePriorityPrivilege 3756 wmic.exe Token: SeCreatePagefilePrivilege 3756 wmic.exe Token: SeBackupPrivilege 3756 wmic.exe Token: SeRestorePrivilege 3756 wmic.exe Token: SeShutdownPrivilege 3756 wmic.exe Token: SeDebugPrivilege 3756 wmic.exe Token: SeSystemEnvironmentPrivilege 3756 wmic.exe Token: SeRemoteShutdownPrivilege 3756 wmic.exe Token: SeUndockPrivilege 3756 wmic.exe Token: SeManageVolumePrivilege 3756 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
CS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeUmbral1.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exeCS2Cheat.exedescription pid process target process PID 4004 wrote to memory of 1684 4004 CS2Cheat.exe CS2Cheat.exe PID 4004 wrote to memory of 1684 4004 CS2Cheat.exe CS2Cheat.exe PID 4004 wrote to memory of 1684 4004 CS2Cheat.exe CS2Cheat.exe PID 4004 wrote to memory of 2420 4004 CS2Cheat.exe Umbral1.exe PID 4004 wrote to memory of 2420 4004 CS2Cheat.exe Umbral1.exe PID 1684 wrote to memory of 3192 1684 CS2Cheat.exe CS2Cheat.exe PID 1684 wrote to memory of 3192 1684 CS2Cheat.exe CS2Cheat.exe PID 1684 wrote to memory of 3192 1684 CS2Cheat.exe CS2Cheat.exe PID 1684 wrote to memory of 2716 1684 CS2Cheat.exe Umbral1.exe PID 1684 wrote to memory of 2716 1684 CS2Cheat.exe Umbral1.exe PID 3192 wrote to memory of 2292 3192 CS2Cheat.exe CS2Cheat.exe PID 3192 wrote to memory of 2292 3192 CS2Cheat.exe CS2Cheat.exe PID 3192 wrote to memory of 2292 3192 CS2Cheat.exe CS2Cheat.exe PID 3192 wrote to memory of 4136 3192 CS2Cheat.exe wmiprvse.exe PID 3192 wrote to memory of 4136 3192 CS2Cheat.exe wmiprvse.exe PID 2292 wrote to memory of 3676 2292 CS2Cheat.exe Umbral1.exe PID 2292 wrote to memory of 3676 2292 CS2Cheat.exe Umbral1.exe PID 2292 wrote to memory of 3676 2292 CS2Cheat.exe Umbral1.exe PID 2292 wrote to memory of 4260 2292 CS2Cheat.exe Umbral1.exe PID 2292 wrote to memory of 4260 2292 CS2Cheat.exe Umbral1.exe PID 2420 wrote to memory of 776 2420 Umbral1.exe Umbral1.exe PID 2420 wrote to memory of 776 2420 Umbral1.exe Umbral1.exe PID 3676 wrote to memory of 1484 3676 CS2Cheat.exe CS2Cheat.exe PID 3676 wrote to memory of 1484 3676 CS2Cheat.exe CS2Cheat.exe PID 3676 wrote to memory of 1484 3676 CS2Cheat.exe CS2Cheat.exe PID 2420 wrote to memory of 2392 2420 Umbral1.exe powershell.exe PID 2420 wrote to memory of 2392 2420 Umbral1.exe powershell.exe PID 3676 wrote to memory of 2236 3676 CS2Cheat.exe Umbral1.exe PID 3676 wrote to memory of 2236 3676 CS2Cheat.exe Umbral1.exe PID 1484 wrote to memory of 5036 1484 CS2Cheat.exe CS2Cheat.exe PID 1484 wrote to memory of 5036 1484 CS2Cheat.exe CS2Cheat.exe PID 1484 wrote to memory of 5036 1484 CS2Cheat.exe CS2Cheat.exe PID 1484 wrote to memory of 2984 1484 CS2Cheat.exe Umbral1.exe PID 1484 wrote to memory of 2984 1484 CS2Cheat.exe Umbral1.exe PID 5036 wrote to memory of 2396 5036 CS2Cheat.exe Umbral1.exe PID 5036 wrote to memory of 2396 5036 CS2Cheat.exe Umbral1.exe PID 5036 wrote to memory of 2396 5036 CS2Cheat.exe Umbral1.exe PID 5036 wrote to memory of 2732 5036 CS2Cheat.exe Umbral1.exe PID 5036 wrote to memory of 2732 5036 CS2Cheat.exe Umbral1.exe PID 2396 wrote to memory of 4220 2396 CS2Cheat.exe CS2Cheat.exe PID 2396 wrote to memory of 4220 2396 CS2Cheat.exe CS2Cheat.exe PID 2396 wrote to memory of 4220 2396 CS2Cheat.exe CS2Cheat.exe PID 2396 wrote to memory of 4912 2396 CS2Cheat.exe CS2Cheat.exe PID 2396 wrote to memory of 4912 2396 CS2Cheat.exe CS2Cheat.exe PID 2420 wrote to memory of 4600 2420 Umbral1.exe powershell.exe PID 2420 wrote to memory of 4600 2420 Umbral1.exe powershell.exe PID 4220 wrote to memory of 2660 4220 CS2Cheat.exe CS2Cheat.exe PID 4220 wrote to memory of 2660 4220 CS2Cheat.exe CS2Cheat.exe PID 4220 wrote to memory of 2660 4220 CS2Cheat.exe CS2Cheat.exe PID 4220 wrote to memory of 2232 4220 CS2Cheat.exe Umbral1.exe PID 4220 wrote to memory of 2232 4220 CS2Cheat.exe Umbral1.exe PID 2660 wrote to memory of 2972 2660 CS2Cheat.exe CS2Cheat.exe PID 2660 wrote to memory of 2972 2660 CS2Cheat.exe CS2Cheat.exe PID 2660 wrote to memory of 2972 2660 CS2Cheat.exe CS2Cheat.exe PID 2660 wrote to memory of 1852 2660 CS2Cheat.exe Umbral1.exe PID 2660 wrote to memory of 1852 2660 CS2Cheat.exe Umbral1.exe PID 2972 wrote to memory of 5032 2972 CS2Cheat.exe CS2Cheat.exe PID 2972 wrote to memory of 5032 2972 CS2Cheat.exe CS2Cheat.exe PID 2972 wrote to memory of 5032 2972 CS2Cheat.exe CS2Cheat.exe PID 2972 wrote to memory of 4336 2972 CS2Cheat.exe Umbral1.exe PID 2972 wrote to memory of 4336 2972 CS2Cheat.exe Umbral1.exe PID 5032 wrote to memory of 4536 5032 CS2Cheat.exe CS2Cheat.exe PID 5032 wrote to memory of 4536 5032 CS2Cheat.exe CS2Cheat.exe PID 5032 wrote to memory of 4536 5032 CS2Cheat.exe CS2Cheat.exe -
Views/modifies file attributes 1 TTPs 26 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 972 attrib.exe 4952 attrib.exe 744 776 attrib.exe 2892 attrib.exe 4352 attrib.exe 3088 1248 4480 3664 1164 attrib.exe 2208 2692 2688 5092 2260 3264 2480 372 attrib.exe 372 attrib.exe 4536 attrib.exe 712 attrib.exe 4400 2892 4404 4388
Processes
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"15⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"17⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"18⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"19⤵
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"20⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:64 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"22⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:384 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:720 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:632 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"34⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"35⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"36⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"37⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"38⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"39⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"40⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"41⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"42⤵
- Checks computer location settings
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"43⤵
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"44⤵
- Checks computer location settings
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"45⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"46⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"47⤵
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"48⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"49⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"50⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"51⤵
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"52⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"53⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"54⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"55⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"56⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"57⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"58⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"59⤵
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"60⤵
- System Location Discovery: System Language Discovery
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"61⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"62⤵
- Checks computer location settings
PID:384 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"63⤵
- Checks computer location settings
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"64⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"65⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"66⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"67⤵
- Checks computer location settings
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"68⤵
- Checks computer location settings
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"69⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"70⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"71⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"72⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"73⤵
- Checks computer location settings
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"74⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"75⤵
- System Location Discovery: System Language Discovery
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"76⤵
- Checks computer location settings
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"77⤵
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"78⤵
- System Location Discovery: System Language Discovery
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"79⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"81⤵
- System Location Discovery: System Language Discovery
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"82⤵
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"83⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"85⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"86⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"87⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"88⤵
- Checks computer location settings
PID:364 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"89⤵
- Checks computer location settings
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"90⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"91⤵
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"92⤵
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"93⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"94⤵
- Checks computer location settings
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"95⤵
- Checks computer location settings
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"96⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"97⤵
- Checks computer location settings
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"98⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"99⤵
- Checks computer location settings
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"100⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:972 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"101⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"102⤵
- Checks computer location settings
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"103⤵
- Checks computer location settings
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"104⤵
- Checks computer location settings
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"105⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"106⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"107⤵
- Checks computer location settings
PID:768 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"108⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"109⤵
- Checks computer location settings
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"110⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"111⤵
- Checks computer location settings
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"112⤵
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"113⤵
- Checks computer location settings
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"114⤵
- Checks computer location settings
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"115⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"116⤵
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"117⤵
- Checks computer location settings
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"118⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"119⤵
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"120⤵
- Checks computer location settings
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"121⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"C:\Users\Admin\AppData\Local\Temp\CS2Cheat.exe"122⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-