GridinSoft Threat Intelligence
BIT6203.tmp threat report
GridinSoft Anti-Malware detection
Detected by GridinSoft before you download
The current ThreatInfo record shows this exact file hash detected as Trojan.CoinMiner. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.
- Detection name
- Trojan.CoinMiner
- Recommended action
- Scan and remove
- Last analysis
- 2021-11-30 21:18:19 (4 years ago)
- File hash
- 3444ef19b247efa82d38c452ea6cf3b6
Why it matters
Why GridinSoft flags this file
GridinSoft identifies the sample as Trojan.CoinMiner.
First seen 2017-09-10 12:02:30 (8 years ago); latest analysis 2021-11-30 21:18:19 (4 years ago).
Company metadata: www.onedrive.live.com. Product metadata: OneDrive.
This hash has appeared under multiple file names, which can happen with repackaging, bundling, or deliberate renaming.
ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.
Recommended action
What to do next
- Compare the MD5 above with the file found on the device.
- Check whether the file appears in the observed locations or under one of the alternate names.
- Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.
File context
BIT6203.tmp is a Windows file recorded in the ThreatInfo database. It is associated with OneDrive. The reported company name is www.onedrive.live.com. The current detection status is Trojan.CoinMiner, based on the latest analysis from 2021-11-30 21:18:19 (4 years ago).
If BIT6203.tmp appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Trojan.CoinMiner.
File Details
| Product Name: | OneDrive |
| Company Name: | www.onedrive.live.com |
| MD5: | 3444ef19b247efa82d38c452ea6cf3b6 |
| Size: | 663 KB |
| First Published: | 2017-09-10 12:02:30 (8 years ago) |
| Latest Published: | 2021-11-30 21:18:19 (4 years ago) |
| Status: | Trojan.CoinMiner (on last analysis) | |
| Analysis Date: | 2021-11-30 21:18:19 (4 years ago) |
Detection screenshot
The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.
Common Places:
| %appdata%\msvc |
| %appdata%\appdata |
| %appdata%\ieservise |
| %appdata% |
ThreatInfo has observed BIT6203.tmp in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.
File Names:
9 observed namesThis hash has been seen with multiple file names. Alternate names can appear when software is updated, copied between folders, packed by an installer, or deliberately renamed to avoid recognition. Compare the exact MD5 above before assuming two names refer to the same file.
Geographic signal
Observed country distribution
ThreatInfo has seen BIT6203.tmp across 11 countries. Use this signal to compare local evidence with where the sample is most often reported.
The strongest geographic signal for this file is Thailand with 74.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.
OS Version:
The most common operating system signal for BIT6203.tmp is Windows 10 with 76.4% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.
Analysis
BIT6203.tmp is identified as pe for 64-bit systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.
PE Sections:
Section layout highlights raw-size concentration, repeated names, packer markers, and hashes that can be compared across related samples.
c8865e55d0d8fd31848264ff3a0caba0
4eb7cf9e269d2b87f5cba98f042b6794
5505af672a31e73c01be2aabf4acb609
fc841bf440fea2d8e2042a9510c7ff42
b70a41ade32c2156fcae10b86c313591
00000000000000000000000000000000
81d62f4d23c1b2647ad0a5c578f8c84e
4420ebfd86a1a8972871e5208a5f01e1
c6ef436a7694889fcf45561cf2ca98d4
00b50edab59040e230ae466308e4791e
PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.
Report conclusion
GridinSoft detects this file as Trojan.CoinMiner
This report identifies BIT6203.tmp by MD5 3444ef19b247efa82d38c452ea6cf3b6. If the same file is present on your device, scan the system and remove the detected object after confirming the hash and location.