× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: df6e896ff150788f9d8e2ffbaece71a99762caba2702e1773bfb9f7523cb2116
File name: lvecl-42.exe
Detection ratio: 5 / 56
Analysis date: 2016-04-05 21:17:55 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Baidu Win32.Trojan.Kryptik.xg 20160405
Bkav HW32.Packed.DC6F 20160405
McAfee-GW-Edition BehavesLike.Win32.Sality.jc 20160405
Qihoo-360 QVM20.1.Malware.Gen 20160405
Rising PE:Malware.XPACK-HIE/Heur!1.9C48 [F] 20160405
Ad-Aware 20160405
AegisLab 20160405
AhnLab-V3 20160405
Alibaba 20160405
ALYac 20160405
Antiy-AVL 20160405
Arcabit 20160405
Avast 20160405
AVG 20160405
Avira (no cloud) 20160405
AVware 20160405
Baidu-International 20160405
BitDefender 20160405
CAT-QuickHeal 20160405
ClamAV 20160405
CMC 20160404
Comodo 20160404
Cyren 20160405
DrWeb 20160405
Emsisoft 20160405
ESET-NOD32 20160405
F-Prot 20160405
F-Secure 20160405
Fortinet 20160404
GData 20160405
Ikarus 20160405
Jiangmin 20160405
K7AntiVirus 20160405
K7GW 20160404
Kaspersky 20160405
Kingsoft 20160405
Malwarebytes 20160405
McAfee 20160405
Microsoft 20160405
eScan 20160405
NANO-Antivirus 20160405
nProtect 20160405
Panda 20160405
Sophos AV 20160405
SUPERAntiSpyware 20160405
Symantec 20160331
Tencent 20160405
TheHacker 20160405
TrendMicro 20160405
TrendMicro-HouseCall 20160405
VBA32 20160405
VIPRE 20160405
ViRobot 20160405
Yandex 20160405
Zillya 20160405
Zoner 20160405
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2009-2015, Ivo Beltchev

Product Classic Shell
Original name ClassicExplorerSettings.exe
Internal name ClassicExplorerSettings
File version 4, 2, 4, 0
Description Classic Explorer Settings
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-04-05 19:01:04
Entry Point 0x00003A0D
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
GetUserNameW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegQueryValueExW
RegSetValueExW
ImageList_Replace
ImageList_SetOverlayImage
ImageList_Destroy
ImageList_GetIconSize
ImageList_Create
ImageList_Remove
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_Add
ChooseFontW
GetSaveFileNameW
GetOpenFileNameW
ChooseColorW
CertCloseStore
CryptQueryObject
CertFindCertificateInStore
CryptMsgGetParam
CertGetNameStringW
CryptMsgClose
GetDeviceCaps
GetTextMetricsW
DeleteDC
SetDCPenColor
SetBkMode
GetStockObject
SetDCBrushColor
Rectangle
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
CreateFontW
SetTextColor
GetTextExtentPointW
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
WaitForSingleObject
HeapDestroy
GetFileAttributesW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
WideCharToMultiByte
GetStringTypeA
FindResourceExW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
FormatMessageW
InitializeCriticalSection
LoadResource
FindClose
InterlockedDecrement
GetEnvironmentVariableW
SetLastError
GetUserDefaultUILanguage
TlsGetValue
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
lstrcmpiW
EnumResourceLanguagesW
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
CreateThread
GetExitCodeThread
GlobalAddAtomA
SetUnhandledExceptionFilter
CreateMutexW
IsProcessorFeaturePresent
TerminateProcess
WriteConsoleA
GetVersion
SetCurrentDirectoryW
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
GetFileSize
GetStartupInfoW
DeleteFileW
GetProcAddress
AddAtomW
GetProcessHeap
EnumResourceNamesW
WriteFile
FindFirstFileW
ExpandEnvironmentStringsA
CreateFileW
VirtualProtectEx
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
lstrlenW
VirtualFree
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCPInfo
HeapSize
InterlockedCompareExchange
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
GetFileAttributesExW
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
SysStringLen
VarCmp
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
SysFreeString
VariantInit
SHEmptyRecycleBinW
ShellExecuteExW
ShellExecuteW
SHAppBarMessage
DoEnvironmentSubstW
PathFindFileNameW
PathRemoveFileSpecW
PathAppendW
PathFindExtensionW
PathAddExtensionW
SHAutoComplete
MapWindowPoints
RegisterWindowMessageW
GetUserObjectInformationW
GetMessagePos
GetParent
CreateDialogIndirectParamW
GetFocus
GetMessageW
OffsetRect
DefWindowProcW
FindWindowW
DestroyMenu
MapVirtualKeyW
PostQuitMessage
ShowWindow
GetWindowLongW
FillRect
DrawFrameControl
GetClassInfoExW
GetWindowThreadProcessId
GetSysColorBrush
SetWindowLongW
IsWindow
PeekMessageW
RegisterClassExW
UnhookWindowsHookEx
LoadIconW
CharUpperW
GetMonitorInfoW
GetThreadDesktop
AppendMenuW
SendDlgItemMessageW
GetDlgItemTextW
PostMessageW
GetKeyNameTextW
DispatchMessageW
SetDlgItemTextW
GetMenuItemID
GetKeyState
GetMenuItemCount
IsDialogMessageW
GetSysColor
CreatePopupMenu
CheckMenuItem
DestroyIcon
UnregisterClassA
MonitorFromWindow
TranslateMessage
DrawIconEx
IsWindowVisible
SendMessageA
GetWindowTextLengthW
SetWindowTextW
GetDlgItem
AllowSetForegroundWindow
MessageBoxW
EnableMenuItem
ScreenToClient
TrackPopupMenuEx
SetTimer
CallWindowProcW
TrackPopupMenu
ClientToScreen
EnableWindow
IsDlgButtonChecked
GetWindowTextW
CheckDlgButton
GetDesktopWindow
SetWindowsHookExW
LoadCursorW
GetSystemMenu
FindWindowExW
CreateWindowExW
InsertMenuW
wsprintfW
PtInRect
GetAncestor
IsChild
SetFocus
DestroyWindow
IsAppThemed
EnableThemeDialogTexture
OpenThemeData
CloseThemeData
DrawThemeBackground
GetThemePartSize
SetWindowTheme
HttpQueryInfoW
InternetQueryOptionW
InternetConnectW
InternetCrackUrlW
InternetCloseHandle
HttpSendRequestW
InternetReadFile
InternetOpenW
HttpOpenRequestW
PlaySoundW
timeGetTime
WinVerifyTrust
free
isalpha
exit
atol
calloc
fopen
isspace
__set_app_type
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
CLSIDFromProgID
CoTaskMemFree
Number of PE resources by type
RT_ICON 9
RT_GROUP_ICON 4
RT_BITMAP 2
RT_VERSION 1
Number of PE resources by language
ENGLISH US 16
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
2.57

ImageVersion
2.57

FileSubtype
0

FileVersionNumber
4.2.4.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Unicode

InitializedDataSize
477696

EntryPoint
0x3a0d

OriginalFileName
ClassicExplorerSettings.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2009-2015, Ivo Beltchev

FileVersion
4, 2, 4, 0

TimeStamp
2016:04:05 20:01:04+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
ClassicExplorerSettings

ProductVersion
4, 2, 4, 0

FileDescription
Classic Explorer Settings

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
IvoSoft

CodeSize
185856

ProductName
Classic Shell

ProductVersionNumber
4.2.4.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 ac867448623e90985a8aec61b767d34d
SHA1 2d2548527a5bfaf4bacb2c98ba21b6fab7fef9de
SHA256 df6e896ff150788f9d8e2ffbaece71a99762caba2702e1773bfb9f7523cb2116
ssdeep
12288:/DdI0aTC1C78YzU+xSpTFG5S4PaFe2wyG0ncNfBPo4rfhqbPh3a:iBe1ClUcoA44PHMGyiZP1w

authentihash 3c19a4568f16fbe48dee4065f0e07b018fab3f5c04239e5dc6c79ba8d2146dcd
imphash 09c607f5f364b29a945337a83e2efaef
File size 645.0 KB ( 660480 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.3%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe

VirusTotal metadata
First submission 2016-04-05 21:17:55 UTC ( 3 years, 1 month ago )
Last submission 2016-04-11 06:48:02 UTC ( 3 years, 1 month ago )
File names ClassicExplorerSettings
lvecl-42.exe
ClassicExplorerSettings.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created processes
Code injections in the following processes
Terminated processes
Created mutexes
Opened mutexes
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications