GridinSoft Threat Intelligence
AZcloud_dbg.exe threat report
GridinSoft Anti-Malware detection
Detected by GridinSoft before you download
The current ThreatInfo record shows this exact file hash detected as Trojan.Downloader. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.
- Detection name
- Trojan.Downloader
- Recommended action
- Scan and remove
- Last analysis
- 2025-03-31 23:01:43 (a year ago)
- File hash
- cb11823c8859d06fd2c76e0e68a35c3b
Why it matters
Why GridinSoft flags this file
GridinSoft identifies the sample as Trojan.Downloader.
First seen 2025-03-31 23:01:43 (a year ago); latest analysis 2025-03-31 23:01:43 (a year ago).
Company metadata: Firebird Project. Product metadata: Firebird SQL Server.
Signed by LGBT. The signature is reported as valid, but signed files can still be bundled or abused.
ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.
Recommended action
What to do next
- Compare the MD5 above with the file found on the device.
- Check whether the file appears in the observed locations or under one of the alternate names.
- Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.
File context
AZcloud_dbg.exe is a Windows file recorded in the ThreatInfo database. It is associated with Firebird SQL Server. The reported company name is Firebird Project. The current detection status is Trojan.Downloader, based on the latest analysis from 2025-03-31 23:01:43 (a year ago).
If AZcloud_dbg.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Trojan.Downloader.
File Details
| Product Name: | Firebird SQL Server |
| Company Name: | Firebird Project |
| MD5: | cb11823c8859d06fd2c76e0e68a35c3b |
| Size: | 5 MB |
| First Published: | 2025-03-31 23:01:43 (a year ago) |
| Latest Published: | 2025-03-31 23:01:43 (a year ago) |
| Status: | Trojan.Downloader (on last analysis) | |
| Analysis Date: | 2025-03-31 23:01:43 (a year ago) |
Detection screenshot
The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.
Overview
| Signed By: | LGBT |
| Status: | Valid |
The signature on AZcloud_dbg.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.
Common Places:
| %commonappdata% |
ThreatInfo has observed AZcloud_dbg.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.
Geographic signal
Observed country distribution
ThreatInfo has seen AZcloud_dbg.exe across 1 countries. Use this signal to compare local evidence with where the sample is most often reported.
The strongest geographic signal for this file is Brazil with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.
OS Version:
The most common operating system signal for AZcloud_dbg.exe is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.
Analysis
AZcloud_dbg.exe is identified as pe for 64-bit systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.
PE Sections:
Section layout highlights raw-size concentration, repeated names, packer markers, and hashes that can be compared across related samples.
3b21dfd2b675e42aadfe44770594e1ff
42b279a96fc35b89356cee7ecc14b4f8
a5491731fa2372fe5e8da495e5acefa3
eb881683f1411d16df3a94def15971c1
2bd2860142487112f7bad9b877e03aa4
122f7ce4694e7b2bf91308f27daecb26
a5265f963bf5777d77d00764a5977cd9
caa46441236feb5e21c0dc326fff4fdb
0f2a690e93d4c1137b9f9f1b40e4baae
ead7052272716587b676c8fe4590b12c
728e11bfaef797b640682ae8a1616c32
fc431ef6bf022a54d982bde8316e957a
PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.
Report conclusion
GridinSoft detects this file as Trojan.Downloader
This report identifies AZcloud_dbg.exe by MD5 cb11823c8859d06fd2c76e0e68a35c3b. If the same file is present on your device, scan the system and remove the detected object after confirming the hash and location.