Analysis
-
max time kernel
105s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 03:35
Behavioral task
behavioral1
Sample
2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe
-
Size
70KB
-
MD5
fda0bb9e0800968ae8ddc387b47a2644
-
SHA1
6f2ba4f2f635cba1bae5fa0eda28cd08915d68f1
-
SHA256
ac180766d0bf48d0c8e9423f606d3a587f0ac570a1b9c5c2d4bf966d39fb6840
-
SHA512
7d1dce251244c1c6f245e5d5e433db7bd5a2007dd1b1b04585f25117fac10b9fe5a083a87510827e547c4cc5f79c967f4fb9adbed53fd23eadc78d78b05ee1fd
-
SSDEEP
1536:yZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:5d5BJHMqqDL2/Ovvdr
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 63 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\epkxurvwwtj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tqvmzuekwrt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fnudbuzfvau = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ygmzpzxqfue = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hdoznljschz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\iyhxjyqgieq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cgnpnsikbka = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\jrvvoeyrgzk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kicahoeqrnh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\jghqtbzxkbz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qnsraqaiokq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ayifrfwdlbs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sugqxhdhdqi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\usvesmdxvsb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hrxxzwctvzi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\difzkslsgxq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rfucegfggor = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\iardvbeifwc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tvlpvljumep = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\azqlaincyqs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\etsamnhlsbk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vhvtfgkiike = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mxyctfumojv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kchrjvaaqtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yufugcthbtp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xuexbjcsdtt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\oaxcktssckw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bxayfyijkzx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cgdytekrjhs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vfynaqtsfty = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ozojazyohhw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\imluhxmuici = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\puguiibpegj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\quhrgivgzfi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fmtvwfmlkls = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wgchrasiywj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fbmtymrxdgj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vzamsedpocp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\flfiiaunkup = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ridaqwwfwwk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\omkvebixgec = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vnduacslvzv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bpxikdpeqol = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vihtctlektt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xryqaobcfhg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lmofahcczym = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\jegqtdegcrh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rpgbeadthij = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tnuhgaasqxx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lkcylayzhnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rwmeomimlvs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xscxjsugshm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hdgkqsgdlfh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nqrruaynvtb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ihdnjecunkh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hqzdagzkljk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vcciqkzzblr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\jupcchxnjib = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tgtmfhvtokb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pwbbcgdwrnq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ugmtsvlppdv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ukpkwlvcwvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\aqdbedxfaij = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe" 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\W: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\P: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\W: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Y: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\U: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\E: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\P: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\G: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\B: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\B: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Y: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\K: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\B: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\A: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\K: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\O: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Y: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\R: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\N: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\V: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\E: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\B: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\I: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\B: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\L: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\A: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\G: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\E: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\T: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\K: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\N: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\M: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Y: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\E: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\I: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\S: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\K: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\E: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\M: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\T: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\B: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\I: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\R: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\W: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\X: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Y: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\N: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Q: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\R: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Y: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\G: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\M: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\Z: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\B: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\K: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\V: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\U: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\P: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\P: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe File opened (read-only) \??\L: 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3216 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 3216 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 3216 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 3216 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5292 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5292 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5292 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5292 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 4488 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 4488 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 4488 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 4488 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2020 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2020 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2020 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2020 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5532 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5532 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5532 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5532 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2700 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2700 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2700 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2700 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2348 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2348 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2348 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2348 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2480 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2480 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2480 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2480 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2860 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2860 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2860 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 2860 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 872 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 872 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 872 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 872 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1692 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1692 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1692 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1692 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5136 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5136 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5136 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5136 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1448 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1448 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1448 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1448 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5404 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5404 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5404 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 5404 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 3944 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 3944 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 3944 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 3944 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1060 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1060 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1060 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe 1060 2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 5292 868 cmd.exe 92 PID 868 wrote to memory of 5292 868 cmd.exe 92 PID 868 wrote to memory of 5292 868 cmd.exe 92 PID 4764 wrote to memory of 4488 4764 cmd.exe 96 PID 4764 wrote to memory of 4488 4764 cmd.exe 96 PID 4764 wrote to memory of 4488 4764 cmd.exe 96 PID 5812 wrote to memory of 2020 5812 cmd.exe 101 PID 5812 wrote to memory of 2020 5812 cmd.exe 101 PID 5812 wrote to memory of 2020 5812 cmd.exe 101 PID 512 wrote to memory of 5532 512 cmd.exe 106 PID 512 wrote to memory of 5532 512 cmd.exe 106 PID 512 wrote to memory of 5532 512 cmd.exe 106 PID 5536 wrote to memory of 2700 5536 cmd.exe 109 PID 5536 wrote to memory of 2700 5536 cmd.exe 109 PID 5536 wrote to memory of 2700 5536 cmd.exe 109 PID 5904 wrote to memory of 2348 5904 cmd.exe 113 PID 5904 wrote to memory of 2348 5904 cmd.exe 113 PID 5904 wrote to memory of 2348 5904 cmd.exe 113 PID 5224 wrote to memory of 2480 5224 cmd.exe 116 PID 5224 wrote to memory of 2480 5224 cmd.exe 116 PID 5224 wrote to memory of 2480 5224 cmd.exe 116 PID 672 wrote to memory of 2860 672 cmd.exe 119 PID 672 wrote to memory of 2860 672 cmd.exe 119 PID 672 wrote to memory of 2860 672 cmd.exe 119 PID 1452 wrote to memory of 872 1452 cmd.exe 124 PID 1452 wrote to memory of 872 1452 cmd.exe 124 PID 1452 wrote to memory of 872 1452 cmd.exe 124 PID 2808 wrote to memory of 1692 2808 cmd.exe 127 PID 2808 wrote to memory of 1692 2808 cmd.exe 127 PID 2808 wrote to memory of 1692 2808 cmd.exe 127 PID 4288 wrote to memory of 5136 4288 cmd.exe 130 PID 4288 wrote to memory of 5136 4288 cmd.exe 130 PID 4288 wrote to memory of 5136 4288 cmd.exe 130 PID 5940 wrote to memory of 1448 5940 cmd.exe 133 PID 5940 wrote to memory of 1448 5940 cmd.exe 133 PID 5940 wrote to memory of 1448 5940 cmd.exe 133 PID 2584 wrote to memory of 5404 2584 cmd.exe 136 PID 2584 wrote to memory of 5404 2584 cmd.exe 136 PID 2584 wrote to memory of 5404 2584 cmd.exe 136 PID 2836 wrote to memory of 3944 2836 cmd.exe 139 PID 2836 wrote to memory of 3944 2836 cmd.exe 139 PID 2836 wrote to memory of 3944 2836 cmd.exe 139 PID 4632 wrote to memory of 1060 4632 cmd.exe 142 PID 4632 wrote to memory of 1060 4632 cmd.exe 142 PID 4632 wrote to memory of 1060 4632 cmd.exe 142 PID 2792 wrote to memory of 3584 2792 cmd.exe 145 PID 2792 wrote to memory of 3584 2792 cmd.exe 145 PID 2792 wrote to memory of 3584 2792 cmd.exe 145 PID 4372 wrote to memory of 412 4372 cmd.exe 148 PID 4372 wrote to memory of 412 4372 cmd.exe 148 PID 4372 wrote to memory of 412 4372 cmd.exe 148 PID 3808 wrote to memory of 3456 3808 cmd.exe 151 PID 3808 wrote to memory of 3456 3808 cmd.exe 151 PID 3808 wrote to memory of 3456 3808 cmd.exe 151 PID 4808 wrote to memory of 3776 4808 cmd.exe 154 PID 4808 wrote to memory of 3776 4808 cmd.exe 154 PID 4808 wrote to memory of 3776 4808 cmd.exe 154 PID 3376 wrote to memory of 4768 3376 cmd.exe 157 PID 3376 wrote to memory of 4768 3376 cmd.exe 157 PID 3376 wrote to memory of 4768 3376 cmd.exe 157 PID 3484 wrote to memory of 208 3484 cmd.exe 160 PID 3484 wrote to memory of 208 3484 cmd.exe 160 PID 3484 wrote to memory of 208 3484 cmd.exe 160 PID 1084 wrote to memory of 4708 1084 cmd.exe 163
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5812 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5536 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5224 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5940 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5520
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5216
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5776
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5568
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5572
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5292
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:5256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe1⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exeC:\Users\Admin\AppData\Local\Temp\2025-04-10_fda0bb9e0800968ae8ddc387b47a2644_elex_gandcrab.exe2⤵
- System Location Discovery: System Language Discovery
PID:2268
-