Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Overview
overview
10Static
static
10virus/xmri...64.sys
windows10-2004-x64
1virus/xmri...64.sys
windows10-1703-x64
1virus/xmri...0M.cmd
windows7-x64
1virus/xmri...0M.cmd
windows10-1703-x64
1virus/xmri...1M.cmd
windows7-x64
1virus/xmri...1M.cmd
windows10-1703-x64
1virus/xmri...le.cmd
windows7-x64
1virus/xmri...le.cmd
windows10-1703-x64
1virus/xmri...le.cmd
windows10-2004-x64
1virus/xmri...le.cmd
windows10-1703-x64
1virus/xmri...le.cmd
windows10-1703-x64
1virus/xmri...le.cmd
windows10-1703-x64
1virus/xmri...rt.cmd
windows10-1703-x64
1virus/xmri...rt.cmd
windows10-1703-x64
1virus/xmri...ig.exe
windows10-2004-x64
1virus/xmri...ig.exe
windows10-1703-x64
1Behavioral task
behavioral1
Sample
virus/xmrig-6.21.3/WinRing0x64.sys
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
virus/xmrig-6.21.3/WinRing0x64.sys
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
virus/xmrig-6.21.3/benchmark_10M.cmd
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
virus/xmrig-6.21.3/benchmark_10M.cmd
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
virus/xmrig-6.21.3/benchmark_1M.cmd
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
virus/xmrig-6.21.3/benchmark_1M.cmd
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
virus/xmrig-6.21.3/pool_mine_example.cmd
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
virus/xmrig-6.21.3/pool_mine_example.cmd
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
virus/xmrig-6.21.3/rtm_ghostrider_example.cmd
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
virus/xmrig-6.21.3/rtm_ghostrider_example.cmd
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
virus/xmrig-6.21.3/solo_mine_example.cmd
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
virus/xmrig-6.21.3/solo_mine_example.cmd
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
virus/xmrig-6.21.3/start.cmd
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
virus/xmrig-6.21.3/start.cmd
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
virus/xmrig-6.21.3/xmrig.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
virus/xmrig-6.21.3/xmrig.exe
Resource
win10-20240404-en
Target
virus.rar
Size
2.1MB
MD5
902f2e724b3976b5ed786eac027854af
SHA1
c34b731fdd72c9adc22f0e2c33fcf868adbaf2d1
SHA256
756ca5eff4ddb4d5eca111e88703484ee54bdb716f28368f860a9dd6964d6a4b
SHA512
ce5196a6095fd4fd836775160370d34297806f48e4cfd3b4a0ccf83e5430bb1e448acd3a7322d279589e12aa9f347db7c5681a39f91a31574a9a0eaab8c4b091
SSDEEP
49152:G6Nxcmp65dfnBAq6/LD251YKPUGk3SPadsPJoYNHWMxj2:nNHY5dX6j651YVMaGBTNH4
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb
IoDeleteSymbolicLink
RtlInitUnicodeString
IoDeleteDevice
IoCreateDevice
MmMapIoSpace
KeBugCheckEx
IoCreateSymbolicLink
MmUnmapIoSpace
IofCompleteRequest
__C_specific_handler
HalSetBusDataByOffset
HalGetBusDataByOffset
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WSASetLastError
send
recv
ntohs
htons
htonl
inet_addr
inet_ntoa
gethostbyaddr
WSAGetLastError
WSAIoctl
gethostbyname
WSARecvFrom
WSASocketW
WSASend
WSARecv
gethostname
WSADuplicateSocketW
getpeername
FreeAddrInfoW
GetAddrInfoW
shutdown
socket
setsockopt
listen
connect
closesocket
bind
WSACleanup
WSAStartup
select
getsockopt
getsockname
ioctlsocket
getservbyname
getservbyport
GetAdaptersAddresses
GetUserProfileDirectoryW
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
GetStringTypeW
InitializeCriticalSectionAndSpinCount
WriteConsoleW
SetConsoleTitleA
GetStdHandle
SetConsoleMode
GetConsoleMode
QueryPerformanceFrequency
QueryPerformanceCounter
SizeofResource
LockResource
LoadResource
FindResourceW
ExpandEnvironmentStringsA
GetConsoleWindow
GetSystemFirmwareTable
HeapFree
HeapAlloc
GetProcessHeap
MultiByteToWideChar
SetPriorityClass
GetCurrentProcess
SetThreadPriority
GetSystemPowerStatus
GetCurrentThread
GetProcAddress
GetModuleHandleW
GetTickCount
CloseHandle
FreeConsole
VirtualProtect
VirtualFree
VirtualAlloc
GetLargePageMinimum
LocalAlloc
GetLastError
LocalFree
FlushInstructionCache
GetCurrentThreadId
AddVectoredExceptionHandler
DeviceIoControl
GetModuleFileNameW
CreateFileW
SetLastError
GetSystemTime
SystemTimeToFileTime
GetModuleHandleExW
Sleep
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemInfo
SwitchToFiber
DeleteFiber
CreateFiberEx
FindClose
FindFirstFileW
FindNextFileW
WideCharToMultiByte
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
FormatMessageA
GetFileType
WriteFile
GetEnvironmentVariableW
GetACP
ConvertFiberToThread
ConvertThreadToFiberEx
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryW
ReadConsoleA
ReadConsoleW
PostQueuedCompletionStatus
CreateFileA
DuplicateHandle
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
QueueUserWorkItem
RegisterWaitForSingleObject
UnregisterWait
GetNumberOfConsoleInputEvents
ReadConsoleInputW
FillConsoleOutputCharacterW
FillConsoleOutputAttribute
GetConsoleCursorInfo
SetConsoleCursorInfo
GetConsoleScreenBufferInfo
SetConsoleCursorPosition
SetConsoleTextAttribute
WriteConsoleInputW
CreateDirectoryW
FlushFileBuffers
GetDiskFreeSpaceW
GetFileAttributesW
GetFileInformationByHandle
CreateEventW
RtlCaptureContext
GetFullPathNameW
ReadFile
RemoveDirectoryW
SetFilePointerEx
SetFileTime
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
CreateFileMappingA
ReOpenFile
CopyFileW
MoveFileExW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
ReleaseSemaphore
ResumeThread
GetNativeSystemInfo
GetProcessAffinityMask
SetThreadAffinityMask
CreateSemaphoreA
SetConsoleCtrlHandler
GetCurrentDirectoryW
GetLongPathNameW
RtlUnwind
CreateIoCompletionPort
ReadDirectoryChangesW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetTempPathW
GlobalMemoryStatusEx
FileTimeToSystemTime
K32GetProcessMemoryInfo
SetHandleInformation
CancelIoEx
CancelIo
SwitchToThread
SetFileCompletionNotificationModes
LoadLibraryExW
SetErrorMode
GetQueuedCompletionStatus
ConnectNamedPipe
SetNamedPipeHandleState
PeekNamedPipe
CreateNamedPipeW
CancelSynchronousIo
GetNamedPipeHandleStateA
GetNamedPipeClientProcessId
GetNamedPipeServerProcessId
TerminateProcess
GetExitCodeProcess
UnregisterWaitEx
LCMapStringW
DebugBreak
GetModuleHandleA
LoadLibraryExA
GetStartupInfoW
GetModuleFileNameA
GetVersionExA
SetProcessAffinityMask
GetComputerNameA
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetCPInfo
RtlLookupFunctionEntry
GetFinalPathNameByHandleW
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetStdHandle
GetCommandLineA
GetCommandLineW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
ExitProcess
GetFileAttributesExW
SetFileAttributesW
GetConsoleOutputCP
CompareStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
GetTimeZoneInformation
HeapSize
SetEndOfFile
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetFileSizeEx
GetShortPathNameW
CompareStringEx
LCMapStringEx
InitializeCriticalSectionEx
WaitForSingleObjectEx
GetExitCodeThread
SleepConditionVariableSRW
EncodePointer
DecodePointer
GetLastInputInfo
MessageBoxW
GetProcessWindowStation
TranslateMessage
GetUserObjectInformationW
ShowWindow
DispatchMessageA
GetSystemMetrics
MapVirtualKeyW
GetMessageA
SHGetSpecialFolderPathA
CoInitializeEx
CoUninitialize
CoCreateInstance
SystemFunction036
GetUserNameW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
CreateServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
QueryServiceConfigA
DeleteService
ControlService
StartServiceW
OpenServiceW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
LsaOpenPolicy
LsaAddAccountRights
LsaClose
GetTokenInformation
BCryptGenRandom
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ