Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OneDrive_1_25-11-2024.zip

Overview

General Information

Sample name:OneDrive_1_25-11-2024.zip
Analysis ID:1562264
MD5:35f5af664863b514eea4870ad0b3a493
SHA1:8c8630bbba23d64dd1b63fe726982ea2e0fed098
SHA256:fa9e09e1cc1e240440ca21d233841eb0611bc9664bedc9e27f55fc30573dfbb1
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Queries keyboard layouts

Classification

  • System is w10x64_ra
  • rundll32.exe (PID: 1388 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • KRoMX2011.exe (PID: 5772 cmdline: "C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exe" MD5: AB4715B9FECFB81DF1F1EABFB6FCC2AE)
  • KRoMX2011Test.exe (PID: 6088 cmdline: "C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exe" MD5: 7F68F76828F9D216140F32C0438C9A44)
  • KRoMX2018.exe (PID: 1608 cmdline: "C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exe" MD5: 558970C802A04EC81ACAE9B0A403A75D)
  • KRoMX2018Test.exe (PID: 6848 cmdline: "C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exe" MD5: C1347684463DEAA41C304948EE134525)
  • ndcnt.exe (PID: 5932 cmdline: "C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exe" MD5: F99B5953B9D938460BB9EE6E0D24E713)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: KRoMX2018.exe, 0000000E.00000003.2236466330.0000000003848000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.eci.org/eci/en/eciRGB.php
Source: KRoMX2018.exe, 0000000E.00000003.2236466330.0000000003848000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.eci.org/eci/en/eciRGB.phpdesc
Source: classification engineClassification label: clean0.winZIP@6/0@0/0
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A03' WHERE MAG = 'A-3';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_CERT (NAZWA) VALUES ('Global Gap');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES (16, 'zachodniopomorskie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A10' WHERE MAG = 'A-10';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO FORMA_WLASN (ID, NAZWA) VALUES ('G', 'Gospodarstwo Rodzinne');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES ( 6, 'NO3');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B09' WHERE MAG = 'B-9';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A09' WHERE MAG = 'A-9';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B03' WHERE MAG = 'B-3';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES (10, 'podlaskie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES (15, 'wielkopolskie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES ( 7, 'Obicia');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_JAKOSC_DST (ID, NAZWA) VALUES (0, 'Brak wyboru');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES (12, 'Test');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES (14, 'UWG');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES ( 1, 'CUKRY');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B06' WHERE MAG = 'B-6';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A06' WHERE MAG = 'A-6';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO PA_PRD_ZAST (ID_TYP, NAZWA) VALUES (3, 'DW');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE BUNKRY SET NAZWA = 'P1' WHERE ID_BUNKRA = 1;
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A07' WHERE MAG = 'A-7';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO BUNKRY (NAZWA) VALUES ('P4');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A04' WHERE MAG = 'A-4';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B04' WHERE MAG = 'B-4';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE KONTRAH SET NIP_P = ' ' WHERE NIP_P IS NULL;
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE BUNKRY SET NAZWA = 'P2' WHERE ID_BUNKRA = 2;
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES (15, 'Zanieczyszczenia');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO BUNKRY (NAZWA) VALUES ('B1');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B07' WHERE MAG = 'B-7';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PROD (NAZWA) VALUES ('Przysnacki');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PROD (NAZWA) VALUES ('standard');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES (11, 'pomorskie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_CERT (NAZWA) VALUES ('Brak');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE BUNKRY SET NAZWA = 'P3' WHERE ID_BUNKRA = 3;
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO FORMA_WLASN (ID, NAZWA) VALUES ('P', 'Grupa Producencka');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES ( 4, 'lubuskie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES ( 7, 'mazowieckie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO ST_DOCEL(ID_ST_DOCEL, NAZWA, ID_KONTRAH, MAG) VALUES(0, 'BRAK WYBORU', '000', 'NPP');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO PREF_CENNIKI(ID, NAZWA) VALUES (0, 'Kontrahenci preferowani');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES (11, 'Parch');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PROD (NAZWA) VALUES ('Lidl');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B01' WHERE MAG = 'B-1';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO BUNKRY (NAZWA) VALUES ('B2');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A08' WHERE MAG = 'A-8';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A01' WHERE MAG = 'A-1';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B08' WHERE MAG = 'B-8';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES ( 9, 'podkarpackie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES ( 3, 'lubelskie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B10' WHERE MAG = 'B-10';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES ( 8, 'opolskie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO PA_PRD_ZAST (ID_TYP, NAZWA) VALUES (2, 'O');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO PA_PRD_ZAST (ID_TYP, NAZWA) VALUES (4, 'DW (tylko ryflowane)');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_CERT (NAZWA) VALUES ('HACCP');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B02' WHERE MAG = 'B-2';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A02' WHERE MAG = 'A-2';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES ( 4, 'Mycie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO SL_WOJEWODZTW (ID, NAZWA) VALUES ( 2, 'kujawsko-pomorskie');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES ( 8, 'Obite pow 10%');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'A05' WHERE MAG = 'A-5';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO BUNKRY (NAZWA) VALUES ('B3');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO PA_PRD_ZAST (ID_TYP, NAZWA) VALUES (1, 'Z');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: UPDATE GAZOWANIE SET MAG = 'B05' WHERE MAG = 'B-5';
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PROD (NAZWA) VALUES ('Kettle');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_PJ (ID_S_PJ, NAZWA) VALUES ( 5, 'NO2');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO TYP_ROL(ID_TYP_ROL, NAZWA) VALUES('V', 'Vatowiec');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO PREF_CENNIKI(ID, NAZWA) VALUES (1, 'Kontrahenci niepreferowani');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO TERM_SKLADOW (ID, NAZWA) VALUES ('1', 'tymczasowe');
Source: KRoMX2011.exe, 0000000A.00000000.1695751969.0000000000A9F000.00000008.00000001.01000000.00000006.sdmp, KRoMX2011Test.exe, 0000000B.00000000.1800960557.0000000000A9D000.00000008.00000001.01000000.00000008.sdmpBinary or memory string: INSERT INTO S_CERT (NAZWA) VALUES ('Euro Gap');
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exe "C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exe"
Source: unknownProcess created: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exe "C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exe"
Source: unknownProcess created: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exe "C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exe"
Source: unknownProcess created: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exe "C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exe"
Source: unknownProcess created: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exe "C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exe"
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: msdart.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: duser.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: msdart.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: duser.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: msdart.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: duser.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: msdart.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: duser.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000514-0000-0010-8000-00AA006D2EA4}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeWindow found: window name: TComboBoxJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeFile opened: C:\Windows\SysWOW64\Msftedit.DLLJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: OneDrive_1_25-11-2024.zipStatic file information: File size 53451478 > 1048576
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: KRoMX2011.exe, 0000000A.00000003.1828962952.0000000001459000.00000004.00000020.00020000.00000000.sdmp, KRoMX2011Test.exe, 0000000B.00000003.1959107299.00000000013EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Rundll32
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1562264 Sample: OneDrive_1_25-11-2024.zip Startdate: 25/11/2024 Architecture: WINDOWS Score: 0 4 KRoMX2011Test.exe 2->4         started        6 KRoMX2011.exe 2->6         started        8 KRoMX2018.exe 2->8         started        10 3 other processes 2->10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.eci.org/eci/en/eciRGB.phpdescKRoMX2018.exe, 0000000E.00000003.2236466330.0000000003848000.00000004.00001000.00020000.00000000.sdmpfalse
    high
    http://www.eci.org/eci/en/eciRGB.phpKRoMX2018.exe, 0000000E.00000003.2236466330.0000000003848000.00000004.00001000.00020000.00000000.sdmpfalse
      high
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1562264
      Start date and time:2024-11-25 12:35:35 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 17s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsinteractivecookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:17
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:OneDrive_1_25-11-2024.zip
      Detection:CLEAN
      Classification:clean0.winZIP@6/0@0/0
      Cookbook Comments:
      • Found application associated with file extension: .zip
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing behavior information.
      • VT rate limit hit for: OneDrive_1_25-11-2024.zip
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:Zip archive data, at least v2.0 to extract, compression method=store
      Entropy (8bit):6.728250496491997
      TrID:
      • ZIP compressed archive (8000/1) 100.00%
      File name:OneDrive_1_25-11-2024.zip
      File size:53'451'478 bytes
      MD5:35f5af664863b514eea4870ad0b3a493
      SHA1:8c8630bbba23d64dd1b63fe726982ea2e0fed098
      SHA256:fa9e09e1cc1e240440ca21d233841eb0611bc9664bedc9e27f55fc30573dfbb1
      SHA512:f26ffce90c726ca255849f0884168867f5d055cab38d194335479abd7585fe09b38c0ba8c8f3c34233c1c1073649e1986a1779ac8c7d2fda845501a6730ff124
      SSDEEP:393216:vwwj5VFiDqRGPaOV5+r9ejQfTt4+wQ+h2TgMK0PX+BLsrl6ocdDWuxH353J:vwyQKGPa7EjQfTmb4TgMKDLsYhtXxHp5
      TLSH:BDC78D16B6459439C0261B328D2BAB55643BBFB1AA318447BBF83F0D5FF0641BD3924B
      File Content Preview:PK.........VyY................KRoMX2011.exeMZP.....................@......Pjr......................................!..L.!..This program must be run under Win32..$7............................................................................................
      Icon Hash:1c1c1e4e4ececedc
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:06:36:05
      Start date:25/11/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      Imagebase:0x7ff7ffa50000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:10
      Start time:06:36:58
      Start date:25/11/2024
      Path:C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011.exe"
      Imagebase:0x400000
      File size:11'163'648 bytes
      MD5 hash:AB4715B9FECFB81DF1F1EABFB6FCC2AE
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:Borland Delphi
      Reputation:low
      Has exited:true

      Target ID:11
      Start time:06:37:07
      Start date:25/11/2024
      Path:C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2011Test.exe"
      Imagebase:0x400000
      File size:11'145'216 bytes
      MD5 hash:7F68F76828F9D216140F32C0438C9A44
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:Borland Delphi
      Reputation:low
      Has exited:true

      Target ID:14
      Start time:06:37:20
      Start date:25/11/2024
      Path:C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018.exe"
      Imagebase:0x400000
      File size:10'969'088 bytes
      MD5 hash:558970C802A04EC81ACAE9B0A403A75D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:Borland Delphi
      Reputation:low
      Has exited:true

      Target ID:15
      Start time:06:37:37
      Start date:25/11/2024
      Path:C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\OneDrive_1_25-11-2024\KRoMX2018Test.exe"
      Imagebase:0x400000
      File size:10'953'216 bytes
      MD5 hash:C1347684463DEAA41C304948EE134525
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:Borland Delphi
      Reputation:low
      Has exited:false

      Target ID:16
      Start time:06:37:53
      Start date:25/11/2024
      Path:C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\OneDrive_1_25-11-2024\ndcnt.exe"
      Imagebase:0x400000
      File size:1'434'624 bytes
      MD5 hash:F99B5953B9D938460BB9EE6E0D24E713
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:Borland Delphi
      Reputation:low
      Has exited:false

      No disassembly