| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| Compilation Date | 2025-Dec-23 12:47:49 |
| Detected languages |
English - United States
|
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains references to mining pools:
|
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to MD5
Uses constants related to SHA1 Uses constants related to SHA256 Uses constants related to SHA512 Uses constants related to AES Uses constants related to Blowfish Uses known Diffie-Helman primes Uses known Mersenne Twister constants Microsoft's Cryptography API |
| Suspicious | The PE is possibly packed. |
Unusual section name found: _RANDOMX
Unusual section name found: _TEXT_CN Unusual section name found: _TEXT_CN Unusual section name found: .fptable |
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Malicious | VirusTotal score: 49/68 (Scanned on 2026-02-05 05:13:26) |
ALYac:
Gen:Variant.Application.Miner.293
APEX: Malicious AhnLab-V3: CoinMiner/Win.Generic.X2238 Alibaba: Trojan:Win32/Coinminer.449 Antiy-AVL: RiskWare/Win64.Agent Arcabit: Trojan.Application.Miner.293 Avira: PUA/CoinMiner.Gen BitDefender: Gen:Variant.Application.Miner.293 Bkav: W64.AIDetectMalware CAT-QuickHeal: Trojan.Ghanarava.17696697178b5609 CTX: exe.miner.generic ClamAV: Win.Coinminer.Generic-7151250-0 CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 99) DeepInstinct: MALICIOUS DrWeb: Tool.BtcMine.2816 ESET-NOD32: Win64/CoinMiner.IZ potentially unwanted application Elastic: Multi.Cryptominer.Xmrig Emsisoft: Gen:Variant.Application.Miner.293 (B) F-Secure: PotentialRisk.PUA/CoinMiner.Gen Fortinet: Riskware/CoinMiner GData: Win64.Application.Coinminer.CP Google: Detected Gridinsoft: Trojan.Win64.CoinMiner.mz!s6 Ikarus: PUA.CoinMiner K7AntiVirus: Unwanted-Program ( 005cde501 ) K7GW: Unwanted-Program ( 005cde501 ) Kingsoft: Win32.Troj.Undef.a Lionic: Riskware.Win32.BitMiner.1!c Malwarebytes: CoinMiner.Trojan.Miner.DDS McAfeeD: ti!A7C8D7E6EB5C MicroWorld-eScan: Gen:Variant.Application.Miner.293 Paloalto: generic.ml Panda: Trj/GdSda.A Rising: HackTool.XMRMiner!1.C2EC (CLASSIC) Sangfor: Trojan.Win64.XMR.Miner SentinelOne: Static AI - Malicious PE Sophos: XMRig Miner (PUA) Symantec: ML.Attribute.HighConfidence Tencent: Riskware.Win64.Miner_l.16001723 Trapmine: suspicious.low.ml.score TrellixENS: CoinMiner-FEF VIPRE: Gen:Variant.Application.Miner.293 Varist: W64/Trojan3.ASMH Yandex: Riskware.Agent!bWkslVCn6+Y Zillya: Tool.BitMiner.Win32.5685 alibabacloud: Miner:Multi/XmrigGo.SY huorong: HackTool/W64.CoinMiner.a!crit |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x120 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 10 |
| TimeDateStamp | 2025-Dec-23 12:47:49 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x42de00 |
| SizeOfInitializedData | 0x1f4c00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00000000003F4164 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x8c8000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| WS2_32.dll |
WSASetLastError
send recv ntohs htons htonl inet_addr inet_ntoa gethostbyaddr WSAGetLastError WSAIoctl gethostbyname WSARecvFrom WSASocketW WSASend WSARecv gethostname WSADuplicateSocketW getpeername FreeAddrInfoW GetAddrInfoW shutdown socket setsockopt listen connect closesocket bind WSACleanup WSAStartup select getsockopt getsockname ioctlsocket getservbyname getservbyport |
|---|---|
| IPHLPAPI.DLL |
GetAdaptersAddresses
|
| USERENV.dll |
GetUserProfileDirectoryW
|
| CRYPT32.dll |
CertFreeCertificateContext
CertFindCertificateInStore CertEnumCertificatesInStore CertCloseStore CertOpenStore CertGetCertificateContextProperty CertDuplicateCertificateContext |
| KERNEL32.dll |
UnhandledExceptionFilter
SetUnhandledExceptionFilter IsProcessorFeaturePresent WriteConsoleW SetConsoleTitleA GetStdHandle SetConsoleMode GetConsoleMode QueryPerformanceFrequency QueryPerformanceCounter SizeofResource LockResource LoadResource FindResourceW ExpandEnvironmentStringsA GetConsoleWindow GetSystemFirmwareTable HeapFree HeapAlloc GetProcessHeap MultiByteToWideChar SetPriorityClass GetCurrentProcess SetThreadPriority GetSystemPowerStatus GetCurrentThread GetProcAddress GetModuleHandleW GetTickCount CloseHandle FreeConsole VirtualProtect VirtualFree VirtualAlloc GetLargePageMinimum LocalAlloc GetLastError LocalFree FlushInstructionCache GetCurrentThreadId AddVectoredExceptionHandler DeviceIoControl GetModuleFileNameW CreateFileW SetLastError GetSystemTime SystemTimeToFileTime GetModuleHandleExW Sleep InitializeSRWLock ReleaseSRWLockExclusive ReleaseSRWLockShared AcquireSRWLockExclusive AcquireSRWLockShared TlsAlloc TlsGetValue TlsSetValue TlsFree GetSystemInfo SwitchToFiber DeleteFiber CreateFiberEx FindClose FindFirstFileW FindNextFileW WideCharToMultiByte GetSystemDirectoryA FreeLibrary LoadLibraryA FormatMessageA GetFileType WriteFile GetEnvironmentVariableW GetACP ConvertFiberToThread ConvertThreadToFiberEx GetCurrentProcessId GetSystemTimeAsFileTime LoadLibraryW ReadConsoleA ReadConsoleW PostQueuedCompletionStatus CreateFileA DuplicateHandle SetEvent ResetEvent WaitForSingleObject CreateEventA QueueUserWorkItem RegisterWaitForSingleObject UnregisterWait GetNumberOfConsoleInputEvents ReadConsoleInputW FillConsoleOutputCharacterW FillConsoleOutputAttribute GetConsoleCursorInfo SetConsoleCursorInfo GetConsoleScreenBufferInfo SetConsoleCursorPosition SetConsoleTextAttribute WriteConsoleInputW CreateDirectoryW FlushFileBuffers GetDiskFreeSpaceW GetFileAttributesW GetFileInformationByHandle IsDebuggerPresent InitializeSListHead GetFullPathNameW ReadFile RemoveDirectoryW SetFilePointerEx SetFileTime MapViewOfFile FlushViewOfFile UnmapViewOfFile CreateFileMappingA ReOpenFile CopyFileW MoveFileExW CreateHardLinkW GetFileInformationByHandleEx CreateSymbolicLinkW TryAcquireSRWLockExclusive InitializeCriticalSection EnterCriticalSection LeaveCriticalSection DeleteCriticalSection InitOnceExecuteOnce InitializeConditionVariable WakeConditionVariable WakeAllConditionVariable SleepConditionVariableCS ReleaseSemaphore GetExitCodeThread ResumeThread GetNativeSystemInfo GetModuleHandleA GetProcessAffinityMask RtlUnwind CreateSemaphoreA SetConsoleCtrlHandler GetCurrentDirectoryW GetLongPathNameW GetShortPathNameW CreateIoCompletionPort ReadDirectoryChangesW GetEnvironmentStringsW FreeEnvironmentStringsW SetEnvironmentVariableW SetCurrentDirectoryW GetTempPathW GlobalMemoryStatusEx FileTimeToSystemTime K32GetProcessMemoryInfo SetHandleInformation CancelIoEx CancelIo SwitchToThread SetFileCompletionNotificationModes LoadLibraryExW SetErrorMode GetQueuedCompletionStatusEx ConnectNamedPipe SetNamedPipeHandleState PeekNamedPipe CreateNamedPipeW GetOverlappedResult CancelSynchronousIo GetNamedPipeHandleStateA GetNamedPipeClientProcessId GetNamedPipeServerProcessId TerminateProcess GetExitCodeProcess UnregisterWaitEx DebugBreak LoadLibraryExA GetStartupInfoW GetModuleFileNameA GetVersionExA SetProcessAffinityMask GetComputerNameA RtlVirtualUnwind RtlLookupFunctionEntry RtlCaptureContext GetStringTypeW GetCPInfo CompareStringEx LCMapStringEx DecodePointer RtlUnwindEx GetFinalPathNameByHandleW RtlPcToFileHeader RaiseException InitializeCriticalSectionAndSpinCount SetStdHandle GetCommandLineA GetCommandLineW CreateThread ExitThread FreeLibraryAndExitThread GetDriveTypeW SystemTimeToTzSpecificLocalTime ExitProcess GetFileAttributesExW SetFileAttributesW GetConsoleOutputCP FlsAlloc FlsGetValue FlsSetValue FlsFree CompareStringW LCMapStringW GetLocaleInfoW IsValidLocale GetUserDefaultLCID EnumSystemLocalesW HeapReAlloc GetTimeZoneInformation HeapSize HeapQueryInformation SetEndOfFile FindFirstFileExW IsValidCodePage GetOEMCP GetFileSizeEx SetThreadAffinityMask EncodePointer InitializeCriticalSectionEx WaitForSingleObjectEx SleepConditionVariableSRW |
| USER32.dll |
GetLastInputInfo
MessageBoxW GetProcessWindowStation TranslateMessage GetUserObjectInformationW ShowWindow DispatchMessageA GetSystemMetrics MapVirtualKeyW GetMessageA |
| SHELL32.dll |
SHGetSpecialFolderPathA
|
| ole32.dll |
CoInitializeEx
CoUninitialize CoCreateInstance |
| ADVAPI32.dll |
SystemFunction036
GetUserNameW ReportEventW RegisterEventSourceW DeregisterEventSource CryptEnumProvidersW CryptSignHashW CryptDestroyHash CryptCreateHash CryptDecrypt CryptExportKey CryptGetUserKey CryptGetProvParam CryptSetHashParam CryptDestroyKey CryptReleaseContext CryptAcquireContextW CreateServiceW QueryServiceStatus CloseServiceHandle OpenSCManagerW QueryServiceConfigA DeleteService ControlService StartServiceW OpenServiceW LookupPrivilegeValueW AdjustTokenPrivileges OpenProcessToken LsaOpenPolicy LsaAddAccountRights LsaClose GetTokenInformation |
| bcrypt.dll |
BCryptGenRandom
|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2025-Dec-23 12:47:49 |
| Version | 0.0 |
| SizeofData | 1140 |
| AddressOfRawData | 0x5a3978 |
| PointerToRawData | 0x5a2b78 |
| StartAddressOfRawData | 0x1405a3e38 |
|---|---|
| EndAddressOfRawData | 0x1405a3e68 |
| AddressOfIndex | 0x140874528 |
| AddressOfCallbacks | 0x14042fd78 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_ALIGN_8BYTES
|
| Callbacks | (EMPTY) |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x1405de1c0 |
| XOR Key | 0x89506a34 |
|---|---|
| Unmarked objects | 0 |
| C++ objects (33140) | 203 |
| ASM objects (33140) | 11 |
| ASM objects (35207) | 10 |
| C objects (35207) | 19 |
| C++ objects (35207) | 96 |
| C objects (33140) | 22 |
| Total imports | 386 |
| Imports (33140) | 23 |
| C objects (35208) | 818 |
| C++ objects (LTCG) (35208) | 265 |
| ASM objects (35208) | 3 |
| Resource objects (35208) | 1 |
| 151 | 1 |
| Linker (35208) | 1 |
No comments yet.