× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d4f79d7bc639fe86ac68961e6273836b9d7af491773fd054395b33d317017beb
File name: svchost.exe
Detection ratio: 0 / 65
Analysis date: 2017-08-16 01:27:38 UTC ( 3 days, 1 hour ago )
Trusted source! This file belongs to the Microsoft Corporation software catalogue.
Antivirus Result Update
ALYac 20170816
AVG 20170816
AVware 20170815
Ad-Aware 20170816
AegisLab 20170816
AhnLab-V3 20170815
Antiy-AVL 20170816
Arcabit 20170816
Avast 20170816
Avira (no cloud) 20170816
Baidu 20170815
BitDefender 20170816
Bkav 20170815
CAT-QuickHeal 20170814
CMC 20170815
ClamAV 20170816
Comodo 20170815
CrowdStrike Falcon (ML) 20170804
Cylance 20170816
Cyren 20170816
DrWeb 20170816
ESET-NOD32 20170816
Emsisoft 20170816
Endgame 20170721
F-Prot 20170816
F-Secure 20170815
Fortinet 20170815
GData 20170816
Ikarus 20170815
Sophos ML 20170607
Jiangmin 20170815
K7AntiVirus 20170814
K7GW 20170815
Kaspersky 20170816
Kingsoft 20170816
MAX 20170815
Malwarebytes 20170816
McAfee 20170815
McAfee-GW-Edition 20170816
eScan 20170816
Microsoft 20170815
NANO-Antivirus 20170816
Palo Alto Networks (Known Signatures) 20170816
Panda 20170815
Qihoo-360 20170816
Rising 20170816
SUPERAntiSpyware 20170816
SentinelOne (Static ML) 20170806
Sophos AV 20170816
Symantec 20170815
Tencent 20170816
TheHacker 20170814
TotalDefense 20170815
TrendMicro 20170816
TrendMicro-HouseCall 20170815
VBA32 20170814
VIPRE 20170816
ViRobot 20170815
Webroot 20170816
WhiteArmor 20170815
Yandex 20170815
Zillya 20170815
ZoneAlarm by Check Point 20170815
Zoner 20170814
nProtect 20170816
Alibaba 20170815
Symantec Mobile Insight 20170815
Trustlook 20170816
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name svchost.exe
Internal name svchost.exe
File version 6.0.6001.18000 (longhorn_rtm.080118-1840)
Description Host Process for Windows Services
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-01-19 05:32:57
Entry Point 0x00002083
Number of sections 4
PE sections
PE imports
GetTokenInformation
SetSecurityDescriptorOwner
SetEntriesInAclW
RegisterServiceCtrlHandlerW
RegCloseKey
OpenProcessToken
EventRegister
EventWrite
RegDisablePredefinedCacheEx
SetSecurityDescriptorDacl
RegOpenKeyExW
InitializeSecurityDescriptor
StartServiceCtrlDispatcherW
SetServiceStatus
SetSecurityDescriptorGroup
RegQueryValueExW
EventEnabled
GetLastError
HeapFree
LoadLibraryExW
EnterCriticalSection
LCMapStringW
lstrlenW
DeactivateActCtx
FreeLibrary
QueryPerformanceCounter
ExitProcess
LoadLibraryA
SetProcessAffinityUpdateMode
HeapSetInformation
GetCurrentProcess
CreateActCtxW
GetCurrentProcessId
DelayLoadFailureHook
ActivateActCtx
GetCommandLineW
UnhandledExceptionFilter
SetErrorMode
GetProcAddress
InterlockedCompareExchange
GetProcessHeap
RegisterWaitForSingleObject
WideCharToMultiByte
ExpandEnvironmentStringsW
InterlockedExchange
SetUnhandledExceptionFilter
CloseHandle
GetSystemTimeAsFileTime
ReleaseActCtx
lstrcmpW
HeapAlloc
LocalFree
TerminateProcess
lstrcmpiW
InitializeCriticalSection
Sleep
GetTickCount
GetCurrentThreadId
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
RpcServerUnregisterIfEx
I_RpcMapWin32Status
RpcMgmtWaitServerListen
RpcMgmtStopServerListening
RpcServerRegisterIf
RpcServerListen
RpcMgmtSetServerStackSize
RpcServerUnregisterIf
RpcServerUseProtseqEpW
_amsg_exit
__p__fmode
_adjust_fdiv
?terminate@@YAXXZ
_exit
__p__commode
memset
memcpy
__wgetmainargs
_controlfp
_except_handler4_common
exit
_XcptFilter
_cexit
_initterm
__setusermatherr
__set_app_type
RtlAllocateHeap
RtlSubAuthorityCountSid
RtlImageNtHeader
RtlUnhandledExceptionFilter
RtlInitializeSid
RtlSubAuthoritySid
RtlFreeHeap
RtlInitializeCriticalSection
RtlLengthRequiredSid
RtlSetProcessIsCritical
RtlCopySid
Number of PE resources by type
RT_MANIFEST 1
MUI 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 3
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.0

InitializedDataSize
5120

ImageVersion
6.0

ProductName
Microsoft Windows Operating System

FileVersionNumber
6.0.6001.18000

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
svchost.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.0.6001.18000 (longhorn_rtm.080118-1840)

TimeStamp
2008:01:19 06:32:57+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
svchost.exe

ProductVersion
6.0.6001.18000

FileDescription
Host Process for Windows Services

OSVersion
6.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
15360

FileSubtype
0

ProductVersionNumber
6.0.6001.18000

EntryPoint
0x2083

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
Compressed bundles
File identification
MD5 3794b461c45882e06856f282eef025af
SHA1 bf15549a7ec01ac505ccac036aba5b9bae688135
SHA256 d4f79d7bc639fe86ac68961e6273836b9d7af491773fd054395b33d317017beb
ssdeep
384:ZqBHgWPkbXKxUVkOsKVG3GI0yej4dT+VI2GEvmW9ZrbWxOHZ+:ZqBLO6xUVkOs8G3HGj4OISPw

authentihash 323d9c7e98f3aaa999a11ce8ab14c0ba0ce83e2ee151d99223630a9091999ef0
imphash 05f383c9329f4a6a8e3d3d59e85ada56
File size 21.0 KB ( 21504 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe trusted via-tor

Trusted verdicts
This file belongs to the Microsoft Corporation software catalogue. The file is often found with svchost.exe as its name.
VirusTotal metadata
First submission 2008-03-30 20:47:38 UTC ( 9 years, 4 months ago )
Last submission 2017-08-16 01:27:38 UTC ( 3 days, 1 hour ago )
File names svchost.exe
wimb154.tmp
xampupdate.exe
svchost.exe
svchost.exe.safe
wim3b09.tmp
svchost_exe_3794b461c45882e06856f282eef025af
svchost.exe_c2976452
vti-rescan
svchost.exe
wimb22f.tmp
wim541f.tmp
svchost.exe
wim4a0b.tmp
wimc748.tmp
svchost.exe_
csrss.exe
wimd2fb.tmp
svchost.exe
SVCHOST.EXE
IgrsSvcs.exe
sv.exe
wime43f.tmp
C98165FC0045B7F254A7006A6697C7009F0EE8C5.exe
svchost.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!