Online Virus Checker | v.1.0.185.174 |
DB Version: | 2024-08-24 09:00:20 |
CoinMiner is a type of malware that harnesses the victim's computer resources, primarily CPU and RAM, to engage in cryptocurrency mining, such as for Monero or Zcash. This malware establishes persistence by integrating an open-source mining tool into the system's startup routine without the user's consent. Advanced coin miners often employ techniques like timer configurations or CPU usage limits to operate discreetly and avoid detection.
File | dlIhost.exe |
Checked | 2024-08-24 06:24:07 |
MD5 | 5d70f8c5b7a48db9df556346def8a471 |
SHA1 | 616680fafb83a81ff5979bc7bb0ffdf0df42eb9b |
SHA256 | 696bc3a058478d16c2a353bc3514fba556469925cbc4f4610377b661ac0bce1c |
SHA512 | 4809a899c7135801b1409a6efe715cc4e3f7564b22f3e81e6132fe1457cddb8511fc7615af65372b140123e45c757d2174b8dee6874a451d5c6b97c5a6239d9a |
Imphash | 72b6ec48223e4d450dd235275dfa42a4 |
File Size | 4848128 bytes |
Gridinsoft has the capability to identify and eliminate Trojan.Win64.CoinMiner.ca without requiring further user intervention.
CompanyName | Microsoft Corporation |
FileDescription | COM Surrogate |
FileVersion | 10.0.18362.1 (WinBuild.160101.0800) |
InternalName | dllhost.exe |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | dllhost.exe |
ProductName | Microsoft® Windows® Operating System |
ProductVersion | 10.0.18362.1 |
Translation | 0x0000 0x04b0 |
Image Base: | 0x140000000 |
Entry Point: | 0x14031d44c |
Compilation: | 2024-06-03 15:54:33 |
Checksum: | 0x00000000 (Actual: 0x004a3d8a) |
OS Version: | 6.0 |
PEiD: | PE32+ executable (console) x86-64, for MS Windows |
Sign: | The PE file does not contain a certificate table. |
Sections: | 10 |
Imports: | WS2_32, PSAPI, IPHLPAPI, USERENV, CRYPT32, KERNEL32, USER32, ole32, ADVAPI32, bcrypt, |
Exports: | 0 |
Resources: | 2 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x003546a4 | 0x00354800 | 3266d0bcb109d9d7c79596f936429509 | 6.52 |
.rdata | 0x00356000 | 0x0011641e | 0x00116600 | 1e1b63a43bfe8d0979fb4cefe8d1973b | 6.32 |
.data | 0x0046d000 | 0x002a954c | 0x00009800 | 6dce77f130cca25421fee38e61f8d83f | 3.78 |
.pdata | 0x00717000 | 0x0001e0fc | 0x0001e200 | 4a59e2865a83b6c09276cfb8524e006d | 6.31 |
_RANDOMX | 0x00736000 | 0x00000c56 | 0x00000e00 | 9ee63642b94966ecb630ee0843e46b26 | 5.68 |
_TEXT_CN | 0x00737000 | 0x000026d1 | 0x00002800 | afea7882aa31e5987db2f12b8933de56 | 6.08 |
_TEXT_CN | 0x0073a000 | 0x00001184 | 0x00001200 | 409bf3f918f2402291cb56c2e9354b47 | 6.05 |
_RDATA | 0x0073c000 | 0x000001f4 | 0x00000200 | 0ef7e40f0efaaec74ee5fc2d4909d33f | 4.19 |
.rsrc | 0x0073d000 | 0x00000598 | 0x00000600 | 390525d5761115c2c78e89e12906a097 | 3.96 |
.reloc | 0x0073e000 | 0x00007c04 | 0x00007e00 | 20796acead4b376db56a1de604cdf735 | 5.44 |