sqlite3.dll threat report

MD5 1f2e753d3d09f32abc493a04bd16001f
Latest seen 2021-01-04 11:26:54 (5 years ago)
First seen 2020-12-29 14:26:08 (5 years ago)
Size 784 KB
Product SQLite
Signed by GridinSoft, LLC

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as Crack.Gen. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
Crack.Gen
Recommended action
Scan and remove
Last analysis
2021-01-04 11:26:54 (5 years ago)
File hash
1f2e753d3d09f32abc493a04bd16001f
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as Crack.Gen.

Timeline

First seen 2020-12-29 14:26:08 (5 years ago); latest analysis 2021-01-04 11:26:54 (5 years ago).

Publisher context

Company metadata: SQLite Development Team. Product metadata: SQLite.

Digital signature

Signed by GridinSoft, LLC. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

sqlite3.dll is a Windows file recorded in the ThreatInfo database. It is associated with SQLite. The reported company name is SQLite Development Team. The current detection status is Crack.Gen, based on the latest analysis from 2021-01-04 11:26:54 (5 years ago).

If sqlite3.dll appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Crack.Gen.

Product Name: SQLite
Company Name: SQLite Development Team
MD5: 1f2e753d3d09f32abc493a04bd16001f
Size: 784 KB
First Published: 2020-12-29 14:26:08 (5 years ago)
Latest Published: 2021-01-04 11:26:54 (5 years ago)
Status: Crack.Gen (on last analysis)
Analysis Date: 2021-01-04 11:26:54 (5 years ago)
sqlite3.dll detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: GridinSoft, LLC
Status: Valid

The signature on sqlite3.dll is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%
%programfiles%
%programfiles%
%programfiles%
%programfiles%
%programfiles%
%programfiles%
%sysdrive%\system volume information\_restore{34a52fef-6a34-4f6b-b903-020a122bf2da}
%programfiles%
%programfiles%

ThreatInfo has observed sqlite3.dll in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

25.0%
16.7%
8.3%
8.3%
8.3%
8.3%
8.3%
8.3%
8.3%

The strongest geographic signal for this file is Iran, Islamic Republic of with 25.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 7 61.5%
Windows 10 23.1%
Windows XP 15.4%

The most common operating system signal for sqlite3.dll is Windows 7 with 61.5% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

sqlite3.dll is identified as pe for 32 systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows CUI
PE Type: pe
OS Bitness: 32
Image Base: 0x61c00000
Entry Address: 0x00001058

PE Sections:

Name Size of data MD5
.text 555520 93a59c7b6116c0a00ed67c563f5d7d0a
.data 4608 3c29f58a8ca7c69e037f513b92f4743a
.rdata 57344 76436bae7427359f4f955f379c71b50c
.bss 0 00000000000000000000000000000000
.edata 7680 139d8d197cb5944b80353aabd683daf5
.idata 3072 444b2ee3d1af13fc7db1683dffd637a5
.CRT 512 6d4255d104ba578835cb3fd8c59e3d39
.tls 512 bbafc61b9e40d1514ae1e3048c2f7133
.rsrc 1536 10ef639706cbe61dde4452fff5c938fa
.reloc 12288 1ad30761654579562ac37d2403506b15
/4 512 fff688c9eeff69b7d6f007a9c3277525
/19 1024 011ac81319e8d4a8a17886fed659576c
/35 2048 b675590ee7158a8e32bf18ce78fa9343
/51 17408 8991e609baebb415033b5d0cdab3ee81
/63 3584 7b8b671d1139883ee08bf4575c139022
/77 3072 f6b17030dfda3872db2d6dd17f69c535
/89 1536 d5ccfcbe603881a451e5c2c13d18edcb
/102 512 14f8eb767d485e23c1afdee4dcb14cef
/113 6656 08b33d4a667d5b774db6e1836b31f95b
/124 512 60ad4279e64e3057e9da309bc9e4a413

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: