File Name | SQLi Dumper v10.3.exe |
File Type |
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
Scanner Version | 1.0.169.174 |
Database Version | 2024-03-14 03:00:36 UTC |
Malware family: Agent
Hash Type | Value | Action |
---|---|---|
MD5 |
7e24cad66ed0ff73046af136e3877f2b
|
|
SHA1 |
7a1a4cd8b11df423cc7d9548428a8efedcbc5886
|
|
SHA256 |
43225d074cc35ca2366b0b3a1834a872ccb7966bdab929638b9cbe016a9e7115
|
|
SHA512 |
e40aaec6bbb83a58bb78f5fe94b854cc6159eb7c1cf11a3c4e633e0f2952264a7d02bb8df61e99a27edb6ef513455273ede767c30e427a60fb385422de663d52
|
|
ImpHash |
0fdd3d21d2193b717f076a70dfaa659c
|
Icon |
Hash: e1eae1ea06e105932d538b4d178a0bf7
Fuzzy: ce15a9fc607f1524abffc88392b1937e dHash: 9637333333734d17 |
Image Base | 0x140000000 |
Entry Point | 0x1400012fd |
Compilation Time | 1970-01-01 00:00:00 |
Checksum | 0x00469390 (Actual: 0x00469390) |
OS Version | 4.0 |
PEiD Signatures |
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
Digital Signature | The PE file does not contain a certificate table. |
Imports |
2 libraries
KERNEL32, msvcrt |
Exports | 0 functions |
Resources | 4 Resources |
Sections | 11 Sections |
CompanyName | SQLi Dumper |
FileTitle | SQLi Dumper v10.3.exe |
FileDescription | SQLi Dumper |
FileVersion | 10,1,0,0 |
LegalCopyright | [email protected] |
LegalTrademark | |
ProductName | fLaSh |
ProductVersion | 10,1,0,0 |
Translation | 0x0409 0x04e4 |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
25,784 bytes | 26,112 bytes | 6.13 (Normal) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
4756EF35F94F92BC6AC117C746630C7D |
.data |
0x00008000 |
4,565,088 bytes | 4,565,504 bytes | 7.62 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D02B97D3E1619AA3EB548C936068F08B |
.rdata |
0x00463000 |
5,600 bytes | 5,632 bytes | 5.06 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D9466AF3211F0E97FBDCF769B6826FB8 |
.pdata |
0x00465000 |
1,392 bytes | 1,536 bytes | 4.15 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
87FD7077967673D8C966D705F555A5AD |
.xdata |
0x00466000 |
1,096 bytes | 1,536 bytes | 3.28 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
329170C0A591926C1A216A693CA03EB2 |
.bss |
0x00467000 |
4,064 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.idata |
0x00468000 |
1,508 bytes | 1,536 bytes | 4.07 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
514A19398967DDF9514C1AF4A104BB26 |
.CRT |
0x00469000 |
96 bytes | 512 bytes | 0.28 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
2340B1934E77B2B021FC8AE041287F9C |
.tls |
0x0046a000 |
16 bytes | 512 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
BF619EAC0CDF3F68D496EA9344137E8B |
.rsrc |
0x0046b000 |
6,088 bytes | 6,144 bytes | 5.43 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
DFD763479971C9E8AC7CB4E8FF7A5DB8 |
.reloc |
0x0046d000 |
132 bytes | 512 bytes | 1.52 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
FDDE207BF9F6B6BAD4FF335245EF50A2 |
1 section(s) with high entropy (≥7.5) detected - possible packing/encryption
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_ICON | 1 | 4,264 bytes | |
RT_GROUP_ICON | 1 | 20 bytes | |
RT_VERSION | 1 | 680 bytes | |
RT_MANIFEST | 1 | 816 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
The PE file does not contain a certificate table.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Trojan.Win64.Agent.cld without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system