× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 969d8797d969e4b2630324d2e56416785c3eca862dd89dc25c0de8b028f901d2
File name: footer.png
Detection ratio: 19 / 67
Analysis date: 2017-12-20 20:27:13 UTC ( 1 year, 2 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.177606 20171220
ALYac Gen:Variant.Razy.177606 20171220
Arcabit Trojan.Razy.D2B5C6 20171220
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9998 20171219
BitDefender Gen:Variant.Razy.177606 20171220
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20171016
Cylance Unsafe 20171220
Emsisoft Gen:Variant.Razy.177606 (B) 20171220
Endgame malicious (moderate confidence) 20171130
F-Secure Gen:Variant.Razy.177606 20171220
GData Gen:Variant.Razy.177606 20171220
Sophos ML heuristic 20170914
MAX malware (ai score=88) 20171220
eScan Gen:Variant.Razy.177606 20171220
Palo Alto Networks (Known Signatures) generic.ml 20171220
Qihoo-360 HEUR/QVM20.1.F9A1.Malware.Gen 20171220
Rising Malware.XPACK-LNR/Heur!1.5594 (CLASSIC) 20171220
Webroot W32.Trojan.Gen 20171220
WhiteArmor Malware.HighConfidence 20171204
AegisLab 20171220
AhnLab-V3 20171220
Alibaba 20171220
Antiy-AVL 20171220
Avast 20171220
Avast-Mobile 20171220
AVG 20171220
Avira (no cloud) 20171220
AVware 20171220
Bkav 20171220
CAT-QuickHeal 20171220
ClamAV 20171220
CMC 20171218
Comodo 20171220
Cybereason 20171103
Cyren 20171220
DrWeb 20171220
eGambit 20171220
ESET-NOD32 20171220
F-Prot 20171220
Fortinet 20171220
Ikarus 20171220
Jiangmin 20171220
K7AntiVirus 20171220
K7GW 20171220
Kaspersky 20171220
Kingsoft 20171220
Malwarebytes 20171220
McAfee 20171220
McAfee-GW-Edition 20171220
Microsoft 20171220
NANO-Antivirus 20171220
nProtect 20171220
Panda 20171220
SentinelOne (Static ML) 20171207
Sophos AV 20171220
SUPERAntiSpyware 20171220
Symantec 20171220
Symantec Mobile Insight 20171220
Tencent 20171220
TheHacker 20171219
TotalDefense 20171220
TrendMicro 20171220
TrendMicro-HouseCall 20171220
Trustlook 20171220
VBA32 20171219
VIPRE 20171220
ViRobot 20171220
Yandex 20171220
Zillya 20171219
ZoneAlarm by Check Point 20171220
Zoner 20171220
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Coffee Shop Software©. All reserved.

Product Breik Pauz
File version 1.8.1
Description Messaging Coffee Shop Software
Comments Snap
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-12-19 20:06:13
Entry Point 0x000E8E0B
Number of sections 7
PE sections
PE imports
ImageList_Create
ImageList_Add
DeviceIoControl
HeapFree
GetStdHandle
LoadLibraryA
LCMapStringW
ReadFile
FileTimeToSystemTime
GetFileTime
GetConsoleCP
FreeLibrary
LCMapStringA
HeapAlloc
ExitProcess
SetFileTime
TlsAlloc
GetFileAttributesW
GetCommandLineW
RtlUnwind
GetModuleFileNameA
CreatePipe
GetStartupInfoA
EnumSystemLocalesA
FileTimeToLocalFileTime
GetWindowsDirectoryA
GetConsoleMode
SetHandleInformation
WaitForSingleObject
GetUserDefaultLCID
CreateDirectoryA
DeleteFileA
GetCPInfo
TlsGetValue
MultiByteToWideChar
lstrlenW
IsDebuggerPresent
GetCommandLineA
GetProcAddress
InterlockedCompareExchange
GetSystemInfo
GetLocaleInfoW
SetStdHandle
CreateMutexA
CompareStringW
RaiseException
CreateThread
TlsFree
GetSystemDirectoryA
FindFirstFileA
CloseHandle
GetSystemTimeAsFileTime
FindNextFileA
IsValidLocale
ExitThread
HeapReAlloc
GetStringTypeW
GetModuleHandleW
SetEnvironmentVariableA
GetExitCodeProcess
QueryDosDeviceA
MoveFileA
TerminateProcess
ResumeThread
CreateProcessA
GetTimeZoneInformation
SetProcessShutdownParameters
WideCharToMultiByte
HeapCreate
SetLastError
VirtualFree
FindClose
InterlockedDecrement
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
GetTickCount
GetCurrentThreadId
InterlockedIncrement
VirtualAlloc
GetLastError
CompareStringA
SetupOpenInfFileA
SetupDiOpenClassRegKey
GetKeyState
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 4
PE resources
ExifTool file metadata
CodeSize
953344

SubsystemVersion
4.0

Comments
Snap

LinkerVersion
6.0

ImageVersion
4.0

FileSubtype
0

FileVersionNumber
1.8.1.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Messaging Coffee Shop Software

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit, No debug

CharacterSet
Windows, Latin1

InitializedDataSize
74752

EntryPoint
0xe8e0b

MIMEType
application/octet-stream

LegalCopyright
Coffee Shop Software . All reserved.

FileVersion
1.8.1

TimeStamp
2017:12:19 21:06:13+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.9.0.1

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Elental Ins.

LegalTrademarks
Coffee Software . 1980

ProductName
Breik Pauz

ProductVersionNumber
1.9.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 eb991d2a9fff8c52b7ab1c1ef6e12d3b
SHA1 b781537fb1d4be8692699682e8f39f4755f60ac2
SHA256 969d8797d969e4b2630324d2e56416785c3eca862dd89dc25c0de8b028f901d2
ssdeep
12288:4EhtB3RB3aAAE3GbLDsQ6wXT6jp7e2Ckqio8:4StB3RlazfsQ6wXTQ1PqU

authentihash c27d1bd40a8bd11e7c7452120fc90f99e9ad1750e8cf5767075afd8750571b02
imphash 4c3649b6057d011760e65e9e6cdde2e0
File size 1005.0 KB ( 1029120 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2017-12-20 20:27:13 UTC ( 1 year, 2 months ago )
Last submission 2018-05-13 17:41:59 UTC ( 9 months, 2 weeks ago )
File names footer.png
footer.png
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Copied files
Created processes
Opened mutexes
Runtime DLLs
UDP communications