× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2910ebc692d833d949bfd56059e8106d324a276d5f165f874f3fb1b6c613cdd5
File name: svchost.exe
Detection ratio: 0 / 57
Analysis date: 2015-05-25 15:57:54 UTC ( 3 hours, 28 minutes ago )
Trusted source! This file belongs to the Microsoft Corporation software catalogue.
Antivirus Result Update
ALYac 20150525
AVG 20150525
AVware 20150525
Ad-Aware 20150525
AegisLab 20150525
Agnitum 20150524
AhnLab-V3 20150525
Alibaba 20150525
Antiy-AVL 20150525
Avast 20150525
Avira 20150525
Baidu-International 20150525
BitDefender 20150525
Bkav 20150523
ByteHero 20150525
CAT-QuickHeal 20150523
CMC 20150525
ClamAV 20150525
Comodo 20150525
Cyren 20150525
DrWeb 20150525
ESET-NOD32 20150525
Emsisoft 20150525
F-Prot 20150525
F-Secure 20150525
Fortinet 20150525
GData 20150525
Ikarus 20150525
Jiangmin 20150522
K7AntiVirus 20150525
K7GW 20150525
Kaspersky 20150525
Kingsoft 20150525
Malwarebytes 20150525
McAfee 20150525
McAfee-GW-Edition 20150525
MicroWorld-eScan 20150525
Microsoft 20150525
NANO-Antivirus 20150525
Norman 20150525
Panda 20150525
Qihoo-360 20150525
Rising 20150525
SUPERAntiSpyware 20150523
Sophos 20150525
Symantec 20150525
Tencent 20150525
TheHacker 20150521
TotalDefense 20150525
TrendMicro 20150525
TrendMicro-HouseCall 20150525
VBA32 20150523
VIPRE 20150525
ViRobot 20150525
Zillya 20150525
Zoner 20150521
nProtect 20150522
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
© Microsoft Corporation. All rights reserved.

Publisher Microsoft Corporation
Product Microsoft® Windows® Operating System
Original name svchost.exe
Internal name svchost.exe
File version 5.1.2600.5512 (xpsp.080413-2111)
Description Generic Host Process for Win32 Services
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-04-13 19:15:12
Link date 8:15 PM 4/13/2008
Entry Point 0x00002509
Number of sections 3
PE sections
PE imports
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
SetEntriesInAclW
RegCloseKey
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerW
RegOpenKeyExW
InitializeSecurityDescriptor
OpenThreadToken
StartServiceCtrlDispatcherW
GetTokenInformation
SetSecurityDescriptorGroup
RegQueryValueExW
GetLastError
HeapFree
LoadLibraryExW
EnterCriticalSection
LCMapStringW
LoadLibraryA
FreeLibrary
QueryPerformanceCounter
ExitProcess
lstrcmpiW
lstrlenW
GetCurrentProcess
GetCurrentProcessId
DelayLoadFailureHook
GetCommandLineW
UnhandledExceptionFilter
SetErrorMode
GetProcAddress
InterlockedCompareExchange
GetProcessHeap
RegisterWaitForSingleObject
lstrcpyW
WideCharToMultiByte
ExpandEnvironmentStringsW
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
lstrcmpW
LocalFree
TerminateProcess
InitializeCriticalSection
GetTickCount
HeapAlloc
GetCurrentThreadId
GetCurrentThread
LocalAlloc
LeaveCriticalSection
RpcServerUnregisterIfEx
I_RpcMapWin32Status
RpcMgmtWaitServerListen
RpcMgmtStopServerListening
RpcServerUseProtseqEpW
RpcServerListen
RpcMgmtSetServerStackSize
RpcServerUnregisterIf
RpcServerRegisterIf
RtlInitializeSid
RtlAllocateHeap
RtlSubAuthoritySid
RtlCompareUnicodeString
RtlGetDaclSecurityDescriptor
RtlUnhandledExceptionFilter
NtOpenKey
RtlCopySid
RtlInitUnicodeString
RtlQueryInformationAcl
wcscpy
NtQuerySecurityObject
wcscat
RtlSubAuthorityCountSid
RtlFreeHeap
wcslen
RtlImageNtHeader
RtlGetAce
RtlLengthRequiredSid
NtClose
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
7.1

ImageVersion
5.1

FileSubtype
0

FileVersionNumber
5.1.2600.5512

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
2560

EntryPoint
0x2509

OriginalFileName
svchost.exe

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
5.1.2600.5512 (xpsp.080413-2111)

TimeStamp
2008:04:13 20:15:12+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
svchost.exe

ProductVersion
5.1.2600.5512

FileDescription
Generic Host Process for Win32 Services

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
11264

ProductName
Microsoft Windows Operating System

ProductVersionNumber
5.1.2600.5512

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 27c6d03bcdb8cfeb96b716f3d8be3e18
SHA1 49083ae3725a0488e0a8fbbe1335c745f70c4667
SHA256 2910ebc692d833d949bfd56059e8106d324a276d5f165f874f3fb1b6c613cdd5
ssdeep
384:IDvi+JmG6yqlCRaJt4RHS5LutGJae7g9VJnpWCNJbW:INcG6xlCRaJKGOA7SHJ

authentihash 935118e0f69fedb15e1347b4bb644b878ef3dde387f40b4e71c2f16b2d7cff9b
imphash 7a06bdb902da41a74668875a6c42864b
File size 14.0 KB ( 14336 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.3%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe trusted

Trusted verdicts
This file belongs to the Microsoft Corporation software catalogue. The file is often found with svchost.exe as its name. The file belongs to the Win product, it can be found, for example, in SW DVD5 Win English WinXP Mode N OEM.
VirusTotal metadata
First submission 2008-05-01 02:35:20 UTC ( 7 years ago )
Last submission 2015-05-25 12:46:59 UTC ( 6 hours, 39 minutes ago )
File names vsgh0rj8.nq5
vsdl13qt.o9s
vst9h787.llp
set1f9.tmp
vsg608i5.lkk
vsqoh12d.0v3
vsja0nrj.rpb
vs030udk.k1c
vsb21q13.v4s
vsj60n4u.2bn
vs020fsn.bp1
vsbj1fhp.uu4
vs3u1fhp.6tt
vsb411o0.4tr
set260.tmp
Adobe.exe
vso21b78.kqd
vs031agj.ttf
vstdgnsp.44q
vskng5qa.7pa
vs0u1gnq.5oc
vsll0n65.b5l
svchost.exe
vso216g0.kua
vslm06km.3pu
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!