× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6e4dcdabc603ba87d5f8d27bdad5d28b83f983330c128484299093a9ee61f339
File name: lgh.exe
Detection ratio: 0 / 56
Analysis date: 2015-06-01 13:25:29 UTC ( 3 years, 12 months ago ) View latest
Antivirus Result Update
Ad-Aware 20150601
AegisLab 20150601
Yandex 20150601
AhnLab-V3 20150601
Alibaba 20150601
ALYac 20150601
Antiy-AVL 20150601
Avast 20150601
AVG 20150601
Avira (no cloud) 20150601
AVware 20150601
Baidu-International 20150601
BitDefender 20150601
Bkav 20150601
ByteHero 20150601
CAT-QuickHeal 20150601
ClamAV 20150601
CMC 20150530
Comodo 20150601
Cyren 20150601
DrWeb 20150601
Emsisoft 20150601
ESET-NOD32 20150601
F-Prot 20150601
F-Secure 20150601
Fortinet 20150601
GData 20150601
Ikarus 20150601
Jiangmin 20150529
K7AntiVirus 20150601
K7GW 20150601
Kaspersky 20150601
Kingsoft 20150601
Malwarebytes 20150601
McAfee 20150601
McAfee-GW-Edition 20150601
Microsoft 20150601
eScan 20150601
NANO-Antivirus 20150601
nProtect 20150601
Panda 20150601
Qihoo-360 20150601
Rising 20150531
Sophos AV 20150601
SUPERAntiSpyware 20150530
Symantec 20150601
Tencent 20150601
TheHacker 20150601
TotalDefense 20150601
TrendMicro 20150601
TrendMicro-HouseCall 20150601
VBA32 20150601
VIPRE 20150601
ViRobot 20150601
Zillya 20150601
Zoner 20150601
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD BobSoft Mini Delphi -> BoB / BobSoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x001AB4A8
Number of sections 8
PE sections
Overlays
MD5 2155639167a01e08dd9b0d3ee018ce57
File type data
Offset 2241536
Size 505623
Entropy 8.00
PE imports
DrawDibEnd
DrawDibClose
DrawDibSetPalette
DrawDibOpen
DrawDibDraw
RegDeleteKeyA
RegFlushKey
RegCloseKey
GetUserNameA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_SetDragCursorImage
ImageList_Read
ImageList_GetDragImage
ImageList_Create
ImageList_DragMove
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_DragShowNolock
ImageList_Remove
ImageList_EndDrag
PrintDlgA
GetOpenFileNameA
GetSaveFileNameA
SetMapMode
GetWindowOrgEx
SetTextAlign
GetTextMetricsA
CombineRgn
GetObjectType
GetTextExtentPointA
SetPixel
EndDoc
DeleteObject
SetPaletteEntries
CopyEnhMetaFileA
CreateEllipticRgn
CreatePalette
CreateDIBitmap
GetDIBits
ExtCreateRegion
GetEnhMetaFileBits
GetDCOrgEx
StretchBlt
StretchDIBits
GetPaletteEntries
SetWindowExtEx
ExtCreatePen
GetFontData
SetWinMetaFileBits
GetDIBColorTable
DeleteEnhMetaFile
GetSystemPaletteEntries
OffsetRgn
GetCurrentPositionEx
TextOutA
CreateFontIndirectA
GetPixel
GetBrushOrgEx
ExcludeClipRect
SetBkMode
PtInRegion
BitBlt
GetDeviceCaps
CreateFontA
SetAbortProc
FrameRgn
CreateBrushIndirect
SelectPalette
SetBkColor
CreateEnhMetaFileA
ExtSelectClipRgn
CloseEnhMetaFile
SetROP2
EndPage
GetNearestPaletteIndex
SetDIBColorTable
SetPixelV
SetViewportExtEx
CreatePenIndirect
AddFontResourceA
PatBlt
SetStretchBltMode
Rectangle
GetObjectA
CreateDCA
LineTo
DeleteDC
GetMapMode
GetEnhMetaFileDescriptionA
StartPage
GetCharWidthA
RealizePalette
CreatePatternBrush
SetEnhMetaFileBits
IntersectClipRect
CreateBitmap
RectVisible
GetStockObject
PlayEnhMetaFile
ExtTextOutA
UnrealizeObject
GdiFlush
SelectClipRgn
RoundRect
CreateCompatibleDC
GetTextExtentPoint32A
GetWinMetaFileBits
GetEnhMetaFileHeader
SetWindowOrgEx
SelectObject
SetTextCharacterExtra
CreatePolygonRgn
CreateICA
Polygon
CreateHalftonePalette
GetRgnBox
SaveDC
MaskBlt
GetEnhMetaFilePaletteEntries
RestoreDC
GetBitmapBits
CreateDIBSection
SetTextColor
GetClipBox
MoveToEx
SetViewportOrgEx
EnumFontFamiliesExA
SetBrushOrgEx
CreateRectRgn
RemoveFontResourceA
GetClipRgn
StartDocA
CreateCompatibleBitmap
CreateSolidBrush
Polyline
AbortDoc
Ellipse
SetThreadLocale
GetStdHandle
FileTimeToDosDateTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
SetErrorMode
GetLocaleInfoW
GetFullPathNameA
GetFileTime
GetTempPathA
WideCharToMultiByte
InterlockedExchange
WriteFile
GetDiskFreeSpaceA
SetFileAttributesA
SetEvent
LocalFree
ResumeThread
GetExitCodeProcess
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
GetStringTypeExA
GetEnvironmentVariableA
Beep
GlobalFindAtomA
ExitProcess
GetModuleFileNameA
SetProcessWorkingSetSize
GetVolumeInformationA
LoadLibraryExA
SetThreadPriority
GetUserDefaultLCID
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
CreateSemaphoreA
CreateThread
GetExitCodeThread
GlobalAddAtomA
MulDiv
ExitThread
TerminateProcess
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
EnterCriticalSection
FreeLibrary
QueryPerformanceCounter
GetTickCount
VirtualProtect
GetVersionExA
LoadLibraryA
RtlUnwind
GetSystemDirectoryA
GlobalSize
GetStartupInfoA
GetDateFormatA
GetFileSize
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetCPInfo
GetProcAddress
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetProfileStringA
ResetEvent
GetTempFileNameA
GetComputerNameA
FindNextFileA
GlobalLock
GetTimeZoneInformation
CreateEventA
GetFileType
TlsSetValue
CreateFileA
LeaveCriticalSection
GetLastError
DosDateTimeToFileTime
GlobalDeleteAtom
GetSystemInfo
lstrlenA
GlobalFree
GlobalGetAtomNameA
GetThreadLocale
GlobalUnlock
IsDBCSLeadByte
GlobalAlloc
RemoveDirectoryA
WinExec
FileTimeToLocalFileTime
SizeofResource
SearchPathA
GetCurrentProcessId
LockResource
SetFileTime
GetCurrentDirectoryA
GetShortPathNameA
GetCommandLineA
SuspendThread
RaiseException
SetFilePointer
ReadFile
EnumCalendarInfoA
CloseHandle
lstrcpynA
EnumSystemLocalesA
GetACP
GetVersion
FreeResource
CreateProcessA
CompareFileTime
VirtualFree
Sleep
FindResourceA
VirtualAlloc
CompareStringA
CreateStreamOnHGlobal
OleUninitialize
OleDraw
IsEqualGUID
OleInitialize
CoRevokeClassObject
RevokeDragDrop
IsAccelerator
StringFromCLSID
RegisterDragDrop
CoCreateInstance
CoUninitialize
CoLockObjectExternal
ReleaseStgMedium
CoDisconnectObject
OleSetMenuDescriptor
CoRegisterClassObject
CoTaskMemFree
CoInitialize
ProgIDFromCLSID
CoGetClassObject
CreateErrorInfo
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
RegisterTypeLib
VariantClear
LoadTypeLib
GetActiveObject
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
SetErrorInfo
VariantCopy
SafeArrayCreateVector
GetErrorInfo
SysFreeString
DispGetIDsOfNames
VariantInit
ShellExecuteExA
FindExecutableA
ExtractIconExA
DragFinish
SHBrowseForFolderA
SHAppBarMessage
DragQueryFileA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
RedrawWindow
GetForegroundWindow
SetWindowRgn
UnregisterHotKey
DdeAccessData
MoveWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
LoadBitmapA
SetWindowPos
DdeDisconnect
DdeCreateStringHandleA
IsWindow
DispatchMessageA
EndPaint
VkKeyScanA
SetMenuItemInfoA
CharUpperBuffA
WindowFromPoint
DrawIcon
CharToOemA
GetMessageTime
CopyImage
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
DdeInitializeA
GetClassInfoA
GetMenu
UnregisterClassA
GetWindowTextLengthA
SendMessageA
GetClientRect
CharLowerBuffA
DdeFreeStringHandle
SetScrollPos
EnumDisplaySettingsA
DdeFreeDataHandle
IsClipboardFormatAvailable
DestroyCaret
GetKeyboardState
ClientToScreen
GetTopWindow
RegisterHotKey
EnumClipboardFormats
LockWindowUpdate
MsgWaitForMultipleObjects
ScrollWindow
GetWindowTextA
ChangeDisplaySettingsA
GetKeyState
DdeQueryStringA
PtInRect
DrawEdge
ShowCursor
GetParent
UpdateWindow
SetPropA
DdeCmpStringHandles
EqualRect
EnumWindows
DefMDIChildProcA
CreateCaret
ShowWindow
SetClassLongA
GetPropA
GetMenuState
TranslateMDISysAccel
EnableWindow
CallNextHookEx
SetWindowPlacement
PeekMessageA
ScrollDC
IsCharAlphaA
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuItemInfoA
ActivateKeyboardLayout
GetMenuBarInfo
InsertMenuItemA
CreatePopupMenu
GetIconInfo
LoadStringA
SetParent
SetClipboardData
GetSystemMetrics
IsZoomed
GetWindowPlacement
GetWindowRgn
DdeConnect
GetKeyboardLayoutList
DrawMenuBar
CharLowerA
IsIconic
RegisterClassA
GetMenuItemCount
GetWindowLongA
SetTimer
DdeClientTransaction
OemToCharA
DdeUnaccessData
GetActiveWindow
ShowOwnedPopups
FillRect
EnumThreadWindows
CharNextA
WaitForInputIdle
GetSysColorBrush
DdeNameService
CreateMenu
GetUpdateRect
DestroyWindow
IsChild
IsDialogMessageA
SetFocus
MapVirtualKeyA
EmptyClipboard
PostMessageA
BeginPaint
OffsetRect
SetCaretPos
GetScrollPos
keybd_event
KillTimer
RegisterWindowMessageA
DefWindowProcA
DrawFocusRect
MapWindowPoints
IsCharAlphaNumericA
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
InvertRect
SetCapture
ReleaseCapture
GetScrollRange
SetWindowLongA
SetKeyboardState
RemovePropA
SetWindowTextA
CheckMenuItem
GetSubMenu
GetLastActivePopup
DrawIconEx
CreateWindowExA
GetDlgItem
BringWindowToTop
ScreenToClient
DdePostAdvise
InsertMenuA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuStringA
AttachThreadInput
CreateIconFromResource
ValidateRect
GetKeyboardLayout
GetSystemMenu
ReuseDDElParam
GetDC
SetForegroundWindow
PostThreadMessageA
OpenClipboard
GetAsyncKeyState
DrawTextA
IntersectRect
GetScrollInfo
GetCapture
WaitMessage
FindWindowA
MessageBeep
RemoveMenu
GetWindowThreadProcessId
DdeCreateDataHandle
ShowScrollBar
DdeUninitialize
DrawFrameControl
UnhookWindowsHookEx
RegisterClipboardFormatA
DdeSetUserHandle
SetRectEmpty
LoadCursorFromFileA
CallWindowProcA
MessageBoxA
GetClassNameA
GetWindowDC
DestroyCursor
AdjustWindowRectEx
LoadKeyboardLayoutA
GetSysColor
SetScrollInfo
RegisterClassExA
SystemParametersInfoA
DestroyIcon
GetKeyNameTextA
IsWindowVisible
SetMenu
GetDesktopWindow
GetClipboardData
UnpackDDElParam
SetCursorPos
GetDCEx
WinHelpA
UnionRect
FrameRect
SetRect
DeleteMenu
InvalidateRect
DefFrameProcA
DdeQueryConvInfo
CreateIcon
IsRectEmpty
GetCursor
GetFocus
CloseClipboard
DdeGetLastError
GetKeyboardType
LookupIconIdFromDirectory
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
mixerGetLineInfoA
mixerSetControlDetails
timeGetTime
PlaySoundA
mciGetErrorStringA
mixerGetControlDetailsA
mixerGetLineControlsA
mciSendCommandA
mciSendStringA
EnumPrintersA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ioctlsocket
WSAStartup
connect
getsockname
htons
WSAGetLastError
WSACancelAsyncRequest
gethostname
WSAAsyncGetHostByName
recv
inet_addr
send
ntohs
listen
WSAAsyncGetServByName
WSACleanup
gethostbyname
inet_ntoa
WSAAsyncSelect
closesocket
socket
bind
getservbyname
Number of PE resources by type
RT_BITMAP 52
RT_STRING 31
RT_RCDATA 17
RT_GROUP_CURSOR 11
RT_CURSOR 11
RT_ICON 9
TYPELIB 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 76
ENGLISH US 59
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
2.25

ImageVersion
0.0

FileVersionNumber
1.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
ASCII

InitializedDataSize
494080

EntryPoint
0x1ab4a8

OriginalFileName
lgh

MIMEType
application/octet-stream

FileVersion
1.0.0.0

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
lgh

ProductVersion
1.0.0.0

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
1746432

FileSubtype
0

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 5b92e8e3b293ae9ca0268c42402d1219
SHA1 e8890196dfd5523daf154b300a7dd9247445b6c9
SHA256 6e4dcdabc603ba87d5f8d27bdad5d28b83f983330c128484299093a9ee61f339
ssdeep
49152:bGUwKu/5dlHb0xn91Q2C5AVlY7SJb/UQKdy0G9EP+KDC+N5D+1am:bGUBu/5dN+91QNAw7M78dy0fPVDCezm

authentihash 02cac74bc71bf71f1ec37ade9924f3dc528f3aee2203d3b20fecc641dbd68150
imphash 0cc38a01b083d1a65605f812d24574a6
File size 2.6 MB ( 2747159 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows ActiveX control (63.7%)
Win32 EXE PECompact compressed (generic) (22.7%)
Win32 Executable Delphi generic (7.7%)
Win32 Executable (generic) (2.4%)
Win16/32 Executable Delphi generic (1.1%)
Tags
bobsoft peexe overlay

VirusTotal metadata
First submission 2015-06-01 13:25:29 UTC ( 3 years, 12 months ago )
Last submission 2015-06-01 13:25:29 UTC ( 3 years, 12 months ago )
File names lgh.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Searched windows
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.