Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 02:41
Behavioral task
behavioral1
Sample
2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe
-
Size
70KB
-
MD5
a7b7c1266edb7de0bfb01534bf94ab44
-
SHA1
dcf49d90bcc0f2e08485883a1141e9a2e8c0a5dc
-
SHA256
d67a23f0caca7c6c21101ee6f17be9b7290b4f0339961e447e90123c21d22bbc
-
SHA512
f9ef1aae251dbb10bb33ce74a92e14089c657381d2de95bbec2886437cb672360e5fe32977253f323262770a2ac9334806df786ff0c644f7e9213362f7f5bac2
-
SSDEEP
1536:4ZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:3d5BJHMqqDL2/Ovvdr
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nnfcunfwrfo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pqdmwiydmoi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\jfyqemxdhru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xrxxuckogpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tkihvwgfcts = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\famwyampzpy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\msgcwfkrmgv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rpzmceexyxr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dcsnmohepyd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\duquplhngoe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kotkvbhifvh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gmfhulugwjc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\psfrtukemfc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zlykhzohfow = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\emlelieoxtn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xulfpftvncl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\onerohsryzq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kchvgecwtkd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cpgbcwyzkto = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yjyzihksbze = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wbiflraekjz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fwhyxbtvlqj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nvbsraddfzv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\icbalyoitpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xpglodynluc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ttydppbwedh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rboftonztiu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\obehudrduwd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mfnhmhiimni = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kzbduonvpsq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\juvvdwiccjy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yufghhtirue = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ttxgotmgvfc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\uwhqhucwssh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dthcrruasmy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wjgdppvharr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ondtrvjaaxo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nugssknkvlu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\prnjaqjxqvx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ijstgaqyluv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\aobjwkceyqy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kttzhxurbic = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pquasktqgon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hwenfnkkzxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ghtbophuqru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zmkrqjyaiqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mlvnhjddgqi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\omwxchxjmfc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gusqeiyijvf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wcunuuffvqh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gamecfngfxw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\oaavjzyplkk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xmirnviikuh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kvceenleqbw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xerpxjfdriz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\urorxbimcuo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gzlipvxizkm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\jalxygbeggq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kvfcuduapkt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qtqytzqymlq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qrddmpiextx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wjruizefvhc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nvtgbqxgsyr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqgxabnmjfu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe" 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\G: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\M: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\X: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\M: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Z: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\V: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\N: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\P: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\U: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\L: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Z: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\P: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\J: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\R: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\S: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\R: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\N: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\V: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\G: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Z: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\A: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\S: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Z: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\M: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\M: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\K: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\A: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Z: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\K: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\J: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\B: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\X: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\E: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\N: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\V: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\W: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\K: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Z: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Y: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\R: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\S: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\E: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\V: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\R: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Z: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\A: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\V: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\L: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\U: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\Y: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\O: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\S: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\N: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\L: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\R: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\T: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe File opened (read-only) \??\O: 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4384 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4384 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4384 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4384 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3964 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3964 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3964 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3964 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 812 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 812 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 812 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 812 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5096 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5096 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5096 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5096 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3556 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3556 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3556 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3556 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4464 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4464 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4464 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4464 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 1944 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 1944 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 1944 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 1944 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 2452 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 2452 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 2452 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 2452 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4424 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4424 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4424 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4424 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5032 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5032 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5032 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5032 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3852 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3852 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3852 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3852 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3428 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3428 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3428 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 3428 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4860 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4860 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4860 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4860 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4292 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4292 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4292 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4292 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5020 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5020 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5020 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 5020 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4648 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4648 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4648 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe 4648 2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 3964 964 cmd.exe 92 PID 964 wrote to memory of 3964 964 cmd.exe 92 PID 964 wrote to memory of 3964 964 cmd.exe 92 PID 1164 wrote to memory of 812 1164 cmd.exe 96 PID 1164 wrote to memory of 812 1164 cmd.exe 96 PID 1164 wrote to memory of 812 1164 cmd.exe 96 PID 4292 wrote to memory of 5096 4292 cmd.exe 99 PID 4292 wrote to memory of 5096 4292 cmd.exe 99 PID 4292 wrote to memory of 5096 4292 cmd.exe 99 PID 1244 wrote to memory of 3556 1244 cmd.exe 104 PID 1244 wrote to memory of 3556 1244 cmd.exe 104 PID 1244 wrote to memory of 3556 1244 cmd.exe 104 PID 5040 wrote to memory of 4464 5040 cmd.exe 109 PID 5040 wrote to memory of 4464 5040 cmd.exe 109 PID 5040 wrote to memory of 4464 5040 cmd.exe 109 PID 1776 wrote to memory of 1944 1776 cmd.exe 112 PID 1776 wrote to memory of 1944 1776 cmd.exe 112 PID 1776 wrote to memory of 1944 1776 cmd.exe 112 PID 4016 wrote to memory of 2452 4016 cmd.exe 115 PID 4016 wrote to memory of 2452 4016 cmd.exe 115 PID 4016 wrote to memory of 2452 4016 cmd.exe 115 PID 5036 wrote to memory of 4424 5036 cmd.exe 119 PID 5036 wrote to memory of 4424 5036 cmd.exe 119 PID 5036 wrote to memory of 4424 5036 cmd.exe 119 PID 2000 wrote to memory of 5032 2000 cmd.exe 122 PID 2000 wrote to memory of 5032 2000 cmd.exe 122 PID 2000 wrote to memory of 5032 2000 cmd.exe 122 PID 3296 wrote to memory of 3852 3296 cmd.exe 127 PID 3296 wrote to memory of 3852 3296 cmd.exe 127 PID 3296 wrote to memory of 3852 3296 cmd.exe 127 PID 1472 wrote to memory of 3428 1472 cmd.exe 130 PID 1472 wrote to memory of 3428 1472 cmd.exe 130 PID 1472 wrote to memory of 3428 1472 cmd.exe 130 PID 4504 wrote to memory of 4860 4504 cmd.exe 133 PID 4504 wrote to memory of 4860 4504 cmd.exe 133 PID 4504 wrote to memory of 4860 4504 cmd.exe 133 PID 432 wrote to memory of 4292 432 cmd.exe 136 PID 432 wrote to memory of 4292 432 cmd.exe 136 PID 432 wrote to memory of 4292 432 cmd.exe 136 PID 4148 wrote to memory of 5020 4148 cmd.exe 139 PID 4148 wrote to memory of 5020 4148 cmd.exe 139 PID 4148 wrote to memory of 5020 4148 cmd.exe 139 PID 4772 wrote to memory of 4648 4772 cmd.exe 142 PID 4772 wrote to memory of 4648 4772 cmd.exe 142 PID 4772 wrote to memory of 4648 4772 cmd.exe 142 PID 4084 wrote to memory of 2588 4084 cmd.exe 145 PID 4084 wrote to memory of 2588 4084 cmd.exe 145 PID 4084 wrote to memory of 2588 4084 cmd.exe 145 PID 2688 wrote to memory of 2332 2688 cmd.exe 148 PID 2688 wrote to memory of 2332 2688 cmd.exe 148 PID 2688 wrote to memory of 2332 2688 cmd.exe 148 PID 4408 wrote to memory of 3128 4408 cmd.exe 151 PID 4408 wrote to memory of 3128 4408 cmd.exe 151 PID 4408 wrote to memory of 3128 4408 cmd.exe 151 PID 4352 wrote to memory of 2068 4352 cmd.exe 154 PID 4352 wrote to memory of 2068 4352 cmd.exe 154 PID 4352 wrote to memory of 2068 4352 cmd.exe 154 PID 1888 wrote to memory of 1308 1888 cmd.exe 157 PID 1888 wrote to memory of 1308 1888 cmd.exe 157 PID 1888 wrote to memory of 1308 1888 cmd.exe 157 PID 4804 wrote to memory of 1220 4804 cmd.exe 160 PID 4804 wrote to memory of 1220 4804 cmd.exe 160 PID 4804 wrote to memory of 1220 4804 cmd.exe 160 PID 2240 wrote to memory of 4300 2240 cmd.exe 163
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
PID:2068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:1308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
PID:4300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:2412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
PID:4064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- Checks processor information in registry
PID:2520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:2740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
PID:2576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:4484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Checks processor information in registry
PID:3984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:1160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4184
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:3716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
PID:4576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:2940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- Checks processor information in registry
PID:2520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:1052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Checks processor information in registry
PID:1752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:2144
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:5052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:2596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
PID:1160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
PID:4068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
PID:4888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
PID:2924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:3152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:3480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:1172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:2568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:1936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Checks processor information in registry
PID:2120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
PID:2464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:4324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Checks processor information in registry
PID:2824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:3996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
PID:4808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
PID:2020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Checks processor information in registry
PID:2772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:3112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Checks processor information in registry
PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:4724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Checks processor information in registry
PID:1120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:1908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:2748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:1432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:5064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:4188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
PID:1556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
PID:4772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Checks processor information in registry
PID:4860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
PID:5016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
PID:2584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:1632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:2576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:2124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
PID:3288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:1516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:1340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:1624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:4768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_a7b7c1266edb7de0bfb01534bf94ab44_elex_gandcrab.exe2⤵PID:4324
-