DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
rad59AD5.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
rad59AD5.dll
Resource
win11-20241007-en
Target
rad59AD5.exe
Size
53KB
MD5
1a28984d6db3abdb967c0c19b56f887d
SHA1
b815a93dedd5575a77b5fa9c0d77a9bc783cdb27
SHA256
b2b67092d3978b0a199c949591bb1872cbc49b91494726a513be407abc2ca6a9
SHA512
63e255c48e9c36485e6e7bc31319fd407027829713cef93dd61edf132949ce3c2de741a70f6ba90347e3d0aa7112acc95b71a7405711eab925f5a491cd5d513f
SSDEEP
768:g9QHl5zJLsXpwnPA9KYMGZC7SNichPH/kGFyHxr6a6GPxxoqMo5ydqP+qL3i3:g2dJn7dSfjof2Jo5PM
warmcookie
149.248.58.85
3e4d7a5b-aa72-4d5f-8f8c-b292257af55c
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Checks for missing Authenticode signature.
resource |
---|
rad59AD5.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetUserNameW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
CloseHandle
CreateFileW
CreateMutexW
CreatePipe
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
ExpandEnvironmentStringsW
GetComputerNameExW
GetComputerNameW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesW
GetLastError
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetTickCount
GetVolumeInformationW
GlobalMemoryStatusEx
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LocalFree
MultiByteToWideChar
OpenMutexW
PeekNamedPipe
QueryPerformanceCounter
ReadFile
RemoveDirectoryW
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetCurrentDirectoryW
SetFilePointer
SetHandleInformation
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
__iob_func
_amsg_exit
_initterm
_lock
_unlock
_vsnwprintf
_wcsnicmp
abort
calloc
free
fwrite
memcpy
memset
rand
realloc
signal
srand
strcat
strcpy
strlen
strncmp
vfprintf
wcscat
wcscmp
wcscpy
wcslen
wcsncmp
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoUninitialize
SysAllocString
SysFreeString
VariantClear
VariantInit
SHGetFolderPathW
WSAStartup
gethostbyname
gethostname
inet_ntoa
DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ