× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d1cdc85b5dde2620b8ceeb5505ac054d7af7a6b0156ce04bb6a8b9cd84add676
File name: iczvgoshzipd.exe
Detection ratio: 44 / 70
Analysis date: 2018-12-04 14:26:01 UTC ( 5 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware Trojan.Generic.23223430 20181204
AhnLab-V3 Trojan/Win32.Ursnif.R246506 20181204
ALYac Trojan.Generic.23223430 20181204
Antiy-AVL Trojan[Banker]/Win32.IcedID 20181204
Arcabit Trojan.Generic.D1625C86 20181204
Avast Win32:Trojan-gen 20181204
AVG Win32:Trojan-gen 20181204
Avira (no cloud) TR/Crypt.Agent.divdz 20181204
BitDefender Trojan.Generic.23223430 20181204
ClamAV Win.Trojan.Ursnif-6764788-0 20181203
Comodo Malware@#1wywtnc1ok6qo 20181204
Cylance Unsafe 20181204
Cyren W32/Trojan.NJLL-4964 20181204
DrWeb Trojan.IcedID.15 20181204
Emsisoft Trojan.Generic.23223430 (B) 20181204
ESET-NOD32 a variant of Win32/Kryptik.GNFJ 20181204
F-Secure Trojan.Generic.23223430 20181204
Fortinet W32/Ursnif.BW!tr 20181204
GData Trojan.Generic.23223430 20181204
Ikarus Trojan.Win32.Crypt 20181204
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.IcedID.dt 20181204
K7AntiVirus Trojan ( 005424ce1 ) 20181204
K7GW Trojan ( 005424ce1 ) 20181204
Kaspersky HEUR:Trojan.Win32.Generic 20181204
Malwarebytes Trojan.Ursnif 20181204
MAX malware (ai score=82) 20181204
McAfee Ursnif-FQIR!13807D90C02F 20181204
McAfee-GW-Edition Ursnif-FQIR!13807D90C02F 20181204
Microsoft PUA:Win32/Presenoker 20181204
eScan Trojan.Generic.23223430 20181204
NANO-Antivirus Trojan.Win32.IcedID.fkqqak 20181204
Palo Alto Networks (Known Signatures) generic.ml 20181204
Panda Trj/GdSda.A 20181203
Qihoo-360 Win32/Trojan.b25 20181204
Rising Trojan.GenKryptik!8.AA55 (CLOUD) 20181204
Sophos AV Mal/Generic-S 20181204
Symantec Trojan.Gen.2 20181204
Tencent Win32.Trojan.Generic.Dxcy 20181204
TrendMicro TROJ_GEN.R002C0PKU18 20181204
TrendMicro-HouseCall TROJ_GEN.R002C0PKU18 20181204
VBA32 TrojanBanker.IcedID 20181204
Zillya Trojan.IcedID.Win32.21 20181203
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20181204
AegisLab 20181204
Alibaba 20180921
Avast-Mobile 20181204
Babable 20180918
Baidu 20181204
Bkav 20181203
CAT-QuickHeal 20181203
CMC 20181204
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
eGambit 20181204
Endgame 20181108
F-Prot 20181204
Kingsoft 20181204
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181128
Symantec Mobile Insight 20181204
TACHYON 20181204
TheHacker 20181202
TotalDefense 20181204
Trapmine 20181128
Trustlook 20181204
VIPRE 20181204
ViRobot 20181204
Webroot 20181204
Yandex 20181204
Zoner 20181204
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2008 Meltwater Group Reach. All rights reserved

Product Systemonce
Original name childwould.exe
Internal name Systemonce
File version 2.2.40.45
Comments Ar
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-11-26 12:42:56
Entry Point 0x000F054F
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
ImageList_GetIconSize
GetFileTitleA
SetMapMode
GetWindowOrgEx
GetTextMetricsA
CombineRgn
GetViewportOrgEx
GetObjectType
GetBoundsRect
SetLayout
SetPixel
DeleteObject
IntersectClipRect
OffsetWindowOrgEx
CreateEllipticRgn
CreatePalette
CreateDIBitmap
SetTextAlign
StretchBlt
GetTextFaceA
ScaleViewportExtEx
GetPaletteEntries
SetWindowExtEx
SetBkColor
GetBkColor
SetRectRgn
GetTextCharsetInfo
GetSystemPaletteEntries
OffsetRgn
TextOutA
CreateFontIndirectA
CreateRectRgnIndirect
LPtoDP
GetPixel
GetLayout
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
PtInRegion
BitBlt
EnumFontFamiliesA
GetDeviceCaps
FillRgn
FrameRgn
ScaleWindowExtEx
PtVisible
ExtSelectClipRgn
SelectPalette
SetROP2
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
SetPixelV
SetViewportExtEx
CreateCompatibleDC
GetWindowExtEx
PatBlt
CreatePen
GetClipBox
Rectangle
GetObjectA
CreateDCA
LineTo
DeleteDC
RealizePalette
CreateHatchBrush
CreatePatternBrush
SetPaletteEntries
CreateBitmap
RectVisible
GetStockObject
ExtTextOutA
SelectClipRgn
GetTextExtentPoint32A
SetWindowOrgEx
GetViewportExtEx
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
RestoreDC
CreateDIBSection
SetTextColor
ExtFloodFill
MoveToEx
SetViewportOrgEx
CreateRoundRectRgn
EnumFontFamiliesExA
CreateRectRgn
Escape
SelectObject
SetPolyFillMode
CreateCompatibleBitmap
CreateSolidBrush
Polyline
DPtoLP
CopyMetaFileA
Ellipse
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
DeactivateActCtx
WaitForSingleObject
EncodePointer
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetCurrentDirectoryA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
GetTempPathA
GetCPInfo
LoadLibraryW
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
ReleaseActCtx
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
GetProfileIntA
SetLastError
GetUserDefaultUILanguage
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
FlushFileBuffers
GetModuleFileNameA
HeapSetInformation
GetVolumeInformationA
SetThreadPriority
ActivateActCtx
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
FormatMessageA
GetModuleHandleA
CreateThread
GetSystemDirectoryW
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
GetNumberFormatA
VirtualQuery
SearchPathA
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
GetVersionExA
LoadLibraryA
RtlUnwind
GlobalSize
UnlockFile
GetFileSize
GlobalDeleteAtom
GetWindowsDirectoryA
GetStartupInfoW
GlobalLock
GetProcessHeap
CompareStringW
GetFileSizeEx
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
CompareStringA
GetTempFileNameA
DuplicateHandle
GetProcAddress
GlobalAlloc
GetTimeZoneInformation
CreateFileW
GlobalFindAtomA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
LocalReAlloc
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
GlobalGetAtomNameA
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentProcessId
LockResource
HeapQueryInformation
WideCharToMultiByte
HeapSize
SetSystemPowerState
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
CopyFileA
GetModuleHandleW
FreeResource
IsValidCodePage
HeapCreate
FindResourceExW
Sleep
GetFileAttributesExA
FindResourceA
VirtualAlloc
TransparentBlt
AlphaBlend
LresultFromObject
CreateStdAccessibleObject
AccessibleObjectFromWindow
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
VarBstrFromDate
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
VariantInit
SHGetFileInfoA
SHBrowseForFolderA
DragFinish
DragQueryFileA
SHGetSpecialFolderLocation
SHAppBarMessage
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
PathFindFileNameA
PathRemoveFileSpecW
PathFindExtensionA
PathIsUNCA
PathStripToRootA
MapWindowPoints
GetForegroundWindow
SetWindowRgn
RedrawWindow
SetMenuItemBitmaps
LoadBitmapW
DrawStateA
MoveWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
GetNextDlgTabItem
IsWindow
DispatchMessageA
EndPaint
CharUpperBuffA
GrayStringA
WindowFromPoint
PeekMessageA
DrawIcon
GetMessageTime
SetActiveWindow
GetDC
GetAsyncKeyState
DrawTextA
GetDlgCtrlID
GetClassInfoA
GetMenu
IsClipboardFormatAvailable
SendMessageA
GetClientRect
SetMenuDefaultItem
CopyAcceleratorTableA
SetScrollPos
CallNextHookEx
LoadAcceleratorsA
GetWindowTextLengthA
GetMenuDefaultItem
LoadImageW
GetKeyboardState
GetTopWindow
GetSubMenu
LoadImageA
LoadAcceleratorsW
GetActiveWindow
GetWindowTextA
GetKeyState
DestroyWindow
DrawEdge
GetParent
MapDialogRect
UpdateWindow
SetPropA
EqualRect
GetMenuState
GetClassInfoExA
ShowWindow
SetClassLongA
GetPropA
GetNextDlgGroupItem
EnumDisplayMonitors
TranslateMDISysAccel
EnableWindow
SetWindowPlacement
LockWindowUpdate
GetSystemMenu
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
InsertMenuItemA
GetIconInfo
SetParent
SetClipboardData
ScrollWindow
IsCharLowerA
IsZoomed
GetWindowPlacement
MapVirtualKeyExA
GetWindowRgn
DrawMenuBar
IsIconic
RegisterClassA
GetMenuItemCount
TabbedTextOutA
DrawFocusRect
SetTimer
ShowOwnedPopups
FillRect
MonitorFromPoint
CopyRect
DeferWindowPos
RealChildWindowFromPoint
CreateMenu
GetCursorPos
PtInRect
IsChild
IsDialogMessageA
SetFocus
MapVirtualKeyA
GetMessageA
PostMessageA
BeginPaint
OffsetRect
EndDialog
GetScrollPos
CopyIcon
KillTimer
GetMonitorInfoA
RegisterWindowMessageA
DefWindowProcA
ToAsciiEx
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
InvertRect
SetCapture
ReleaseCapture
GetScrollRange
SetWindowLongA
CheckDlgButton
RemovePropA
CreatePopupMenu
CheckMenuItem
GetWindowLongA
GetLastActivePopup
DrawIconEx
CreateWindowExA
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ClientToScreen
GetClassLongA
InsertMenuA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuItemInfoA
DestroyAcceleratorTable
GetDesktopWindow
GetKeyboardLayout
LoadCursorW
LoadIconW
ReuseDDElParam
GetMenuItemID
SetForegroundWindow
NotifyWinEvent
PostThreadMessageA
OpenClipboard
EmptyClipboard
ReleaseDC
IntersectRect
SetLayeredWindowAttributes
GetScrollInfo
LoadMenuA
HideCaret
GetCapture
WaitMessage
ScreenToClient
SetWindowTextA
MessageBeep
LoadMenuW
DrawTextExA
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
BeginDeferWindowPos
AppendMenuA
DrawFrameControl
SetMenu
RegisterClipboardFormatA
SetRectEmpty
GetMenuStringA
CallWindowProcA
MessageBoxA
IsMenu
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
SetScrollInfo
CopyImage
EndDeferWindowPos
SystemParametersInfoA
UpdateLayeredWindow
GetDoubleClickTime
DestroyIcon
GetKeyNameTextA
ShowScrollBar
DefMDIChildProcA
GetUpdateRect
SubtractRect
UnpackDDElParam
SetCursorPos
WinHelpA
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
InvalidateRect
DefFrameProcA
CreateAcceleratorTableA
TranslateAcceleratorA
ValidateRect
IsRectEmpty
GetClassNameA
GetFocus
CloseClipboard
IsWindowVisible
ModifyMenuA
UnhookWindowsHookEx
SetCursor
PlaySoundA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GdipBitmapLockBits
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImagePaletteSize
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
CreateStreamOnHGlobal
OleLockRunning
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoLockObjectExternal
IsAccelerator
OleTranslateAccelerator
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
ReleaseStgMedium
DoDragDrop
RevokeDragDrop
OleDuplicateData
OleGetClipboard
CoInitializeEx
CoCreateInstance
CoTaskMemFree
RegisterDragDrop
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

Comments
Ar

InitializedDataSize
422912

ImageVersion
0.0

ProductName
Systemonce

FileVersionNumber
2.2.40.45

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
10.0

FileTypeExtension
exe

OriginalFileName
childwould.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.2.40.45

TimeStamp
2012:11:26 13:42:56+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Systemonce

ProductVersion
2.2.40.45

UninitializedDataSize
0

OSVersion
5.1

FileOS
Win32

LegalCopyright
Copyright 2008 Meltwater Group Reach. All rights reserved

MachineType
Intel 386 or later, and compatibles

CompanyName
Meltwater Group Reach

CodeSize
1160704

FileSubtype
0

ProductVersionNumber
2.2.40.45

EntryPoint
0xf054f

ObjectFileType
Executable application

File identification
MD5 13807d90c02fd57c0f99e1a1e8fcc78a
SHA1 6639eadd571cd1f5db7fe4372220fa6f85e51e5f
SHA256 d1cdc85b5dde2620b8ceeb5505ac054d7af7a6b0156ce04bb6a8b9cd84add676
ssdeep
24576:lDCJ4rSMxlTU+M7XI3irGNBV38mAMY7fQd5NC/PrmV+upd+T4FH4AzpFH1C0ZwQt:lDm4rSMxy+843ircD3fAMjNC/PrLe+8i

authentihash a6b9aa2484c386a05815384edc713c5cd8e7e6874a2160efb1ca503730b89a2b
imphash 3f9da85a472a82b26ded58c3abcc5577
File size 1.4 MB ( 1482752 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-27 14:25:34 UTC ( 6 months ago )
Last submission 2018-11-27 14:25:34 UTC ( 6 months ago )
File names childwould.exe
Systemonce
iczvgoshzipd.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs