× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 919a0d2696621a0d9df6db433b04ac0bf522b374369f727dc67fff46cd98c265
File name: 919A0D2696621A0D9DF6DB433B04AC0BF522B374369F727DC67FFF46CD98C265
Detection ratio: 23 / 57
Analysis date: 2016-11-02 05:59:04 UTC ( 2 years, 3 months ago ) View latest
Antivirus Result Update
AhnLab-V3 Malware/Gen.Generic.N2142953027 20161102
Avast Win32:Malware-gen 20161102
AVG Crypt6.IOB 20161102
AVware Trojan.Win32.Generic!BT 20161102
Bkav W32.FamVT.RazyNHmA.Trojan 20161101
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20161024
ESET-NOD32 a variant of Win32/Kryptik.FIUO 20161102
Fortinet W32/Yakes.FIUO!tr 20161102
GData Win32.Trojan.Agent.JF2FX4 20161102
Ikarus Trojan.Win32.Crypt 20161101
Sophos ML ransom.win32.tescrypt.a 20161018
Kaspersky Trojan.Win32.Yakes.rkzq 20161102
McAfee Artemis!8786FB80A5CC 20161102
McAfee-GW-Edition BehavesLike.Win32.Malware.fm 20161102
Microsoft TrojanDownloader:Win32/Talalpek.A 20161102
Panda Trj/Agent.OOX 20161101
Qihoo-360 HEUR/QVM09.0.0000.Malware.Gen 20161102
Sophos AV Mal/Generic-S 20161102
Symantec Heur.AdvML.B 20161102
Tencent Win32.Trojan.Yakes.Ebgw 20161102
TrendMicro-HouseCall TROJ_GEN.R072H0DJV16 20161102
VIPRE Trojan.Win32.Generic!BT 20161102
Yandex Trojan.Yakes!yPvvRgSJllY 20161101
Ad-Aware 20161102
AegisLab 20161102
Alibaba 20161102
ALYac 20161102
Antiy-AVL 20161102
Arcabit 20161102
Avira (no cloud) 20161101
Baidu 20161101
BitDefender 20161102
CAT-QuickHeal 20161101
ClamAV 20161101
CMC 20161102
Comodo 20161102
Cyren 20161102
DrWeb 20161102
Emsisoft 20161102
F-Prot 20161102
F-Secure 20161102
Jiangmin 20161102
K7AntiVirus 20161101
K7GW 20161102
Kingsoft 20161102
Malwarebytes 20161102
eScan 20161102
NANO-Antivirus 20161102
nProtect 20161101
Rising 20161102
SUPERAntiSpyware 20161102
TheHacker 20161101
TotalDefense 20161028
TrendMicro 20161102
VBA32 20161101
ViRobot 20161102
Zillya 20161101
Zoner 20161102
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
2005-2013 COMODO. All rights reserved

Product COMODO Internet Security
Original name bsm_chrome.exe
Internal name bsm_chrome.exe
File version 26.0.1410.43
Description COMODO Internet Security
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-10-28 16:02:46
Entry Point 0x00003EBD
Number of sections 4
PE sections
PE imports
CloseEnhMetaFile
GetWindowOrgEx
GetLastError
InterlockedDecrement
HeapFree
CopyFileW
EnterCriticalSection
LCMapStringW
SetHandleCount
GetSystemInfo
lstrlenA
lstrcmpiA
GetVersionExW
FreeLibrary
LCMapStringA
HeapDestroy
GetTickCount
TlsAlloc
GetVersionExA
VirtualProtect
GlobalUnlock
lstrcmpiW
RtlUnwind
lstrlenW
GetStdHandle
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetEnvironmentStrings
GetEnvironmentStringsW
GetLocaleInfoA
GetCurrentProcessId
UnhandledExceptionFilter
GetCPInfo
GetSystemDefaultLCID
TlsGetValue
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
TlsFree
GetPrivateProfileStringW
GetProcessHeap
lstrcpynW
GetModuleHandleA
lstrcpyW
LoadLibraryA
WideCharToMultiByte
LoadLibraryW
GetStringTypeA
ExpandEnvironmentStringsW
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
ExitProcess
GetOEMCP
LocalFree
TerminateProcess
GetModuleFileNameA
QueryPerformanceCounter
Sleep
InitializeCriticalSection
HeapCreate
VirtualQuery
VirtualFree
GetFileAttributesW
IsDebuggerPresent
QueryDosDeviceW
GetFileType
TlsSetValue
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
VirtualAlloc
SetLastError
LeaveCriticalSection
SetTimer
DestroyIcon
EnableWindow
UnhookWindowsHookEx
IsDlgButtonChecked
EndDialog
DialogBoxParamW
FindWindowW
ToAsciiEx
KillTimer
GetDlgCtrlID
GetFocus
SendDlgItemMessageW
SetForegroundWindow
PostMessageW
NotifyWinEvent
CheckDlgButton
DestroyWindow
Number of PE resources by type
RT_ICON 6
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 7
ENGLISH US 2
PE resources
ExifTool file metadata
ProductShortName
COMODO Internet Security

SubsystemVersion
4.0

OfficialBuild
0

InitializedDataSize
401408

ImageVersion
0.0

ProductName
COMODO Internet Security

FileVersionNumber
26.0.1410.43

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
bsm_chrome.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

CompanyShortName
COMODO

FileVersion
26.0.1410.43

TimeStamp
2016:10:28 17:02:46+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
bsm_chrome.exe

ProductVersion
26.0.1410.43

FileDescription
COMODO Internet Security

OSVersion
4.0

FileOS
Win32

LegalCopyright
2005-2013 COMODO. All rights reserved

MachineType
Intel 386 or later, and compatibles

CompanyName
COMODO Security Solutions

CodeSize
36864

FileSubtype
0

ProductVersionNumber
26.0.1410.43

LastChange
189671

EntryPoint
0x3ebd

ObjectFileType
Executable application

File identification
MD5 8786fb80a5ccea96d8d547d15486ce30
SHA1 8243174f53226bbbfec7aa52c7f836ecf06516bc
SHA256 919a0d2696621a0d9df6db433b04ac0bf522b374369f727dc67fff46cd98c265
ssdeep
3072:oTwo5IvCtchLUQKvm0VlwzgGjueZ33gGHpyWj2V0OkiuU0YKN4//sQ2MnkOXj8GU:o8YSK6gC3PyWj40viu+KNSsQ26Tp

authentihash 8d06d421ee4a67fd1f516cf6e4910ea2fea06a9a77e6c7fb2cdaa5f4e2548d84
imphash 15740968cd674f962ef2d3a23f9c2991
File size 340.0 KB ( 348160 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2016-11-02 05:59:04 UTC ( 2 years, 3 months ago )
Last submission 2016-11-02 05:59:04 UTC ( 2 years, 3 months ago )
File names 919A0D2696621A0D9DF6DB433B04AC0BF522B374369F727DC67FFF46CD98C265
bsm_chrome.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications