× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2910ebc692d833d949bfd56059e8106d324a276d5f165f874f3fb1b6c613cdd5
File name: svchost.exe
Detection ratio: 0 / 57
Analysis date: 2015-03-31 21:33:00 UTC ( 27 minutes ago )
Trusted source! This file belongs to the Microsoft Corporation software catalogue.
Antivirus Result Update
ALYac 20150331
AVG 20150331
AVware 20150331
Ad-Aware 20150331
AegisLab 20150331
Agnitum 20150331
AhnLab-V3 20150331
Alibaba 20150331
Antiy-AVL 20150331
Avast 20150331
Avira 20150331
Baidu-International 20150331
BitDefender 20150331
Bkav 20150331
ByteHero 20150331
CAT-QuickHeal 20150331
CMC 20150330
ClamAV 20150331
Comodo 20150331
Cyren 20150331
DrWeb 20150331
ESET-NOD32 20150331
Emsisoft 20150331
F-Prot 20150331
F-Secure 20150331
Fortinet 20150331
GData 20150331
Ikarus 20150331
Jiangmin 20150331
K7AntiVirus 20150331
K7GW 20150331
Kaspersky 20150331
Kingsoft 20150331
Malwarebytes 20150331
McAfee 20150331
McAfee-GW-Edition 20150331
MicroWorld-eScan 20150331
Microsoft 20150331
NANO-Antivirus 20150331
Norman 20150331
Panda 20150331
Qihoo-360 20150331
Rising 20150331
SUPERAntiSpyware 20150331
Sophos 20150331
Symantec 20150331
Tencent 20150331
TheHacker 20150330
TotalDefense 20150331
TrendMicro 20150331
TrendMicro-HouseCall 20150331
VBA32 20150331
VIPRE 20150331
ViRobot 20150331
Zillya 20150331
Zoner 20150330
nProtect 20150331
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
© Microsoft Corporation. All rights reserved.

Publisher Microsoft Corporation
Product Microsoft® Windows® Operating System
Original name svchost.exe
Internal name svchost.exe
File version 5.1.2600.5512 (xpsp.080413-2111)
Description Generic Host Process for Win32 Services
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-04-13 19:15:12
Link date 8:15 PM 4/13/2008
Entry Point 0x00002509
Number of sections 3
PE sections
PE imports
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
SetEntriesInAclW
RegCloseKey
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerW
RegOpenKeyExW
InitializeSecurityDescriptor
OpenThreadToken
StartServiceCtrlDispatcherW
GetTokenInformation
SetSecurityDescriptorGroup
RegQueryValueExW
GetLastError
HeapFree
LoadLibraryExW
EnterCriticalSection
LCMapStringW
LoadLibraryA
FreeLibrary
QueryPerformanceCounter
ExitProcess
lstrcmpiW
lstrlenW
GetCurrentProcess
GetCurrentProcessId
DelayLoadFailureHook
GetCommandLineW
UnhandledExceptionFilter
SetErrorMode
GetProcAddress
InterlockedCompareExchange
GetProcessHeap
RegisterWaitForSingleObject
lstrcpyW
WideCharToMultiByte
ExpandEnvironmentStringsW
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
lstrcmpW
LocalFree
TerminateProcess
InitializeCriticalSection
GetTickCount
HeapAlloc
GetCurrentThreadId
GetCurrentThread
LocalAlloc
LeaveCriticalSection
RpcServerUnregisterIfEx
I_RpcMapWin32Status
RpcMgmtWaitServerListen
RpcMgmtStopServerListening
RpcServerUseProtseqEpW
RpcServerListen
RpcMgmtSetServerStackSize
RpcServerUnregisterIf
RpcServerRegisterIf
RtlInitializeSid
RtlAllocateHeap
RtlSubAuthoritySid
RtlCompareUnicodeString
RtlGetDaclSecurityDescriptor
RtlUnhandledExceptionFilter
NtOpenKey
RtlCopySid
RtlInitUnicodeString
RtlQueryInformationAcl
wcscpy
NtQuerySecurityObject
wcscat
RtlSubAuthorityCountSid
RtlFreeHeap
wcslen
RtlImageNtHeader
RtlGetAce
RtlLengthRequiredSid
NtClose
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
7.1

ImageVersion
5.1

FileSubtype
0

FileVersionNumber
5.1.2600.5512

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
2560

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
5.1.2600.5512 (xpsp.080413-2111)

TimeStamp
2008:04:13 20:15:12+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
svchost.exe

ProductVersion
5.1.2600.5512

FileDescription
Generic Host Process for Win32 Services

OSVersion
5.1

OriginalFilename
svchost.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
11264

ProductName
Microsoft Windows Operating System

ProductVersionNumber
5.1.2600.5512

EntryPoint
0x2509

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 27c6d03bcdb8cfeb96b716f3d8be3e18
SHA1 49083ae3725a0488e0a8fbbe1335c745f70c4667
SHA256 2910ebc692d833d949bfd56059e8106d324a276d5f165f874f3fb1b6c613cdd5
ssdeep
384:IDvi+JmG6yqlCRaJt4RHS5LutGJae7g9VJnpWCNJbW:INcG6xlCRaJKGOA7SHJ

authentihash 935118e0f69fedb15e1347b4bb644b878ef3dde387f40b4e71c2f16b2d7cff9b
imphash 7a06bdb902da41a74668875a6c42864b
File size 14.0 KB ( 14336 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe trusted

Trusted verdicts
This file belongs to the Microsoft Corporation software catalogue. The file is often found with svchost.exe as its name. The file belongs to the Win product, it can be found, for example, in SW DVD5 Win English WinXP Mode N OEM.
VirusTotal metadata
First submission 2008-05-01 02:35:20 UTC ( 6 years, 11 months ago )
Last submission 2015-03-31 21:33:00 UTC ( 27 minutes ago )
File names vsgh0rj8.nq5
vsdl13qt.o9s
vst9h787.llp
set1f9.tmp
vs921q2k.ts5
vsqoh12d.0v3
vsja0nrj.rpb
vs030udk.k1c
vsb21q13.v4s
vsj60n4u.2bn
vsbj1fhp.uu4
vs3u1fhp.6tt
vstl03ao.4c4
set260.tmp
vsrk0bbt.qe3
IMDCSC.exe
vsit13l7.uu3
vsdm0v5q.4sr
vs861ud4.j6v
vstdgnsp.44q
vs0u1gnq.5oc
vsjj0mki.d1b
svchost.exe
vso216g0.kua
vsll0p26.l6v
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!