× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2910ebc692d833d949bfd56059e8106d324a276d5f165f874f3fb1b6c613cdd5
File name: svchost.exe
Detection ratio: 0 / 57
Analysis date: 2015-03-01 19:40:30 UTC ( 7 hours, 54 minutes ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
ALYac 20150301
AVG 20150301
AVware 20150228
Ad-Aware 20150301
AegisLab 20150301
Agnitum 20150228
AhnLab-V3 20150301
Alibaba 20150301
Antiy-AVL 20150301
Avast 20150301
Avira 20150301
Baidu-International 20150301
BitDefender 20150301
Bkav 20150228
ByteHero 20150301
CAT-QuickHeal 20150228
CMC 20150301
ClamAV 20150301
Comodo 20150301
Cyren 20150301
DrWeb 20150301
ESET-NOD32 20150301
Emsisoft 20150301
F-Prot 20150301
F-Secure 20150301
Fortinet 20150301
GData 20150301
Ikarus 20150301
Jiangmin 20150228
K7AntiVirus 20150301
K7GW 20150301
Kaspersky 20150301
Kingsoft 20150301
Malwarebytes 20150301
McAfee 20150301
McAfee-GW-Edition 20150301
MicroWorld-eScan 20150301
Microsoft 20150301
NANO-Antivirus 20150301
Norman 20150301
Panda 20150301
Qihoo-360 20150301
Rising 20150301
SUPERAntiSpyware 20150301
Sophos 20150301
Symantec 20150301
Tencent 20150301
TheHacker 20150227
TotalDefense 20150301
TrendMicro 20150301
TrendMicro-HouseCall 20150301
VBA32 20150227
VIPRE 20150301
ViRobot 20150301
Zillya 20150228
Zoner 20150227
nProtect 20150227
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
© Microsoft Corporation. All rights reserved.

Publisher Microsoft Corporation
Product Microsoft® Windows® Operating System
Original name svchost.exe
Internal name svchost.exe
File version 5.1.2600.5512 (xpsp.080413-2111)
Description Generic Host Process for Win32 Services
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-04-13 19:15:12
Link date 8:15 PM 4/13/2008
Entry Point 0x00002509
Number of sections 3
PE sections
PE imports
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
SetEntriesInAclW
RegCloseKey
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerW
RegOpenKeyExW
InitializeSecurityDescriptor
OpenThreadToken
StartServiceCtrlDispatcherW
GetTokenInformation
SetSecurityDescriptorGroup
RegQueryValueExW
GetLastError
HeapFree
LoadLibraryExW
EnterCriticalSection
LCMapStringW
LoadLibraryA
FreeLibrary
QueryPerformanceCounter
ExitProcess
lstrcmpiW
lstrlenW
GetCurrentProcess
GetCurrentProcessId
DelayLoadFailureHook
GetCommandLineW
UnhandledExceptionFilter
SetErrorMode
GetProcAddress
InterlockedCompareExchange
GetProcessHeap
RegisterWaitForSingleObject
lstrcpyW
WideCharToMultiByte
ExpandEnvironmentStringsW
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
lstrcmpW
LocalFree
TerminateProcess
InitializeCriticalSection
GetTickCount
HeapAlloc
GetCurrentThreadId
GetCurrentThread
LocalAlloc
LeaveCriticalSection
RpcServerUnregisterIfEx
I_RpcMapWin32Status
RpcMgmtWaitServerListen
RpcMgmtStopServerListening
RpcServerUseProtseqEpW
RpcServerListen
RpcMgmtSetServerStackSize
RpcServerUnregisterIf
RpcServerRegisterIf
RtlInitializeSid
RtlAllocateHeap
RtlSubAuthoritySid
RtlCompareUnicodeString
RtlGetDaclSecurityDescriptor
RtlUnhandledExceptionFilter
NtOpenKey
RtlCopySid
RtlInitUnicodeString
RtlQueryInformationAcl
wcscpy
NtQuerySecurityObject
wcscat
RtlSubAuthorityCountSid
RtlFreeHeap
wcslen
RtlImageNtHeader
RtlGetAce
RtlLengthRequiredSid
NtClose
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
2560

ImageVersion
5.1

ProductName
Microsoft Windows Operating System

FileVersionNumber
5.1.2600.5512

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
7.1

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
5.1.2600.5512 (xpsp.080413-2111)

TimeStamp
2008:04:13 20:15:12+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
svchost.exe

ProductVersion
5.1.2600.5512

FileDescription
Generic Host Process for Win32 Services

OSVersion
5.1

OriginalFilename
svchost.exe

LegalCopyright
Microsoft Corporation. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
11264

FileSubtype
0

ProductVersionNumber
5.1.2600.5512

EntryPoint
0x2509

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 27c6d03bcdb8cfeb96b716f3d8be3e18
SHA1 49083ae3725a0488e0a8fbbe1335c745f70c4667
SHA256 2910ebc692d833d949bfd56059e8106d324a276d5f165f874f3fb1b6c613cdd5
ssdeep
384:IDvi+JmG6yqlCRaJt4RHS5LutGJae7g9VJnpWCNJbW:INcG6xlCRaJKGOA7SHJ

authentihash 935118e0f69fedb15e1347b4bb644b878ef3dde387f40b4e71c2f16b2d7cff9b
imphash 7a06bdb902da41a74668875a6c42864b
File size 14.0 KB ( 14336 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2008-05-01 02:35:20 UTC ( 6 years, 10 months ago )
Last submission 2015-03-01 19:40:30 UTC ( 7 hours, 54 minutes ago )
File names vsot07b7.b7f
vsdl13qt.o9s
vst9h787.llp
set1b6.tmp
vs921q2k.ts5
vsqfhn15.j3k
vsqoh12d.0v3
vs030udk.k1c
vsb21q13.v4s
vsj60n4u.2bn
vs030v19.boi
vstl03ao.4c4
vsrk0bbt.qe3
svchost.exe
IMDCSC.exe
vsg31und.aqs
vsit13l7.uu3
vsmkhnab.d7s
vs861ud4.j6v
de2140.exe
vs0316dr.43v
vsll0n65.b5l
svchost.exe
svchost1.exe
Svchost.exe.dr
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!