× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b24c73b06a4d01dab53e583696b7beb6868c76cb558a9d631392c3516d5bbc43
File name: ripped.exe
Detection ratio: 10 / 68
Analysis date: 2018-07-22 20:52:27 UTC ( 10 months ago ) View latest
Antivirus Result Update
Avira (no cloud) TR/Dropper.Gen 20180722
Babable Malware.HighConfidence 20180406
Cybereason malicious.645b07 20180225
Cylance Unsafe 20180722
NANO-Antivirus Trojan.Win32.MLW.dofbor 20180722
Rising Malware.Heuristic!ET#83% (RDM+:cmRtazp/Wx1iPwuwxMJtw6guMKMQ) 20180722
Symantec ML.Attribute.HighConfidence 20180722
TrendMicro PAK_Generic.001 20180722
TrendMicro-HouseCall PAK_Generic.001 20180722
VBA32 Trojan.Genome.aa 20180720
Ad-Aware 20180722
AegisLab 20180722
AhnLab-V3 20180721
Alibaba 20180713
ALYac 20180722
Antiy-AVL 20180722
Arcabit 20180722
Avast 20180722
Avast-Mobile 20180722
AVG 20180722
AVware 20180722
Baidu 20180717
BitDefender 20180722
Bkav 20180719
CAT-QuickHeal 20180722
ClamAV 20180722
CMC 20180722
Comodo 20180722
CrowdStrike Falcon (ML) 20180530
Cyren 20180722
DrWeb 20180722
eGambit 20180722
Emsisoft 20180722
Endgame 20180711
ESET-NOD32 20180722
F-Prot 20180722
F-Secure 20180722
Fortinet 20180722
GData 20180722
Ikarus 20180722
Sophos ML 20180717
Jiangmin 20180722
K7AntiVirus 20180722
K7GW 20180722
Kaspersky 20180722
Kingsoft 20180722
Malwarebytes 20180722
MAX 20180722
McAfee 20180722
McAfee-GW-Edition 20180722
Microsoft 20180722
eScan 20180722
Palo Alto Networks (Known Signatures) 20180722
Panda 20180722
Qihoo-360 20180722
SentinelOne (Static ML) 20180701
Sophos AV 20180722
SUPERAntiSpyware 20180722
TACHYON 20180722
Tencent 20180722
TheHacker 20180722
TotalDefense 20180722
Trustlook 20180722
VIPRE 20180722
ViRobot 20180722
Webroot 20180722
Yandex 20180720
Zillya 20180720
ZoneAlarm by Check Point 20180722
Zoner 20180721
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-07-22 19:32:02
Entry Point 0x000015B8
Number of sections 4
PE sections
PE imports
InitCommonControls
DeleteDC
SelectObject
GetStockObject
BitBlt
SetBkColor
CreateDIBSection
CreateCompatibleDC
DeleteObject
SetTextColor
ExitProcess
GetModuleHandleA
LoadResource
SizeofResource
FindResourceA
RedrawWindow
CreateWindowExA
LoadIconA
ReleaseDC
EndPaint
EndDialog
BeginPaint
SendMessageA
CallWindowProcA
GetDlgItem
SetWindowLongA
DialogBoxParamA
GetDC
LoadBitmapA
SetScrollInfo
Number of PE resources by type
RT_BITMAP 4
RT_DIALOG 1
RT_RCDATA 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:07:22 20:32:02+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
2048

LinkerVersion
5.12

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x15b8

InitializedDataSize
22528

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 97376e9a717e81044795e1bfd15e5d83
SHA1 f610e54645b07d8ad32edb8e82d5027abc2e3b0d
SHA256 b24c73b06a4d01dab53e583696b7beb6868c76cb558a9d631392c3516d5bbc43
ssdeep
384:7WTOFifnVOwfHoRRxp1iIrqIAn9ogZBMHmDBu:7WTOFifFHyxbiIrq/9ogEGD

authentihash cb867862efcba74e3a06b5b57327c52dbc6e13f0ae3ee5ac69ade969da8070e7
imphash 4efd5ef11596098ff57fa10fa38c7f1f
File size 25.0 KB ( 25600 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-07-22 20:52:27 UTC ( 10 months ago )
Last submission 2018-10-28 10:15:36 UTC ( 6 months, 3 weeks ago )
File names ripped.exe
97376e9a717e81044795e1bfd15e5d83.vir
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs