Static | ZeroBOX

PE Compile Time

2009-07-14 08:19:28

PDB Path

svchost.pdb

PE Imphash

58e185299ecca757fe68ba83a6495fde

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000039dc 0x00003a00 6.28512248253
.data 0x00005000 0x000005a8 0x00000600 0.814857483884
.rsrc 0x00006000 0x00000810 0x00000a00 3.76189871791
.reloc 0x00007000 0x000003cc 0x00000400 6.40491458233

Resources

Name Offset Size Language Sub-language File type
MUI 0x00006748 0x000000c8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x000063a0 0x000003a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x000060f0 0x000002b0 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with CRLF line terminators

Imports

Library msvcrt.dll:
0x1001000 __wgetmainargs
0x1001004 _exit
0x1001008 _XcptFilter
0x100100c exit
0x1001010 _initterm
0x1001014 _amsg_exit
0x1001018 __setusermatherr
0x100101c memcpy
0x1001020 _controlfp
0x1001028 ?terminate@@YAXXZ
0x100102c __set_app_type
0x1001030 __p__fmode
0x1001034 __p__commode
0x1001038 _cexit
Library API-MS-Win-Core-ProcessThreads-L1-1-0.dll:
0x1001040 TerminateProcess
0x1001044 GetCurrentProcess
0x1001048 OpenProcessToken
0x100104c GetCurrentProcessId
0x1001050 GetCurrentThreadId
Library KERNEL32.dll:
0x1001058 LocalAlloc
0x100105c CloseHandle
0x1001060 DelayLoadFailureHook
0x1001064 GetProcAddress
0x1001068 GetLastError
0x100106c FreeLibrary
0x1001074 LoadLibraryExA
0x1001078 InterlockedExchange
0x100107c Sleep
0x1001084 GetModuleHandleA
0x100108c GetTickCount
0x1001098 DeactivateActCtx
0x100109c LoadLibraryExW
0x10010a0 ActivateActCtx
0x10010a4 LeaveCriticalSection
0x10010a8 lstrcmpW
0x10010ac EnterCriticalSection
0x10010b0 RegCloseKey
0x10010b4 RegOpenKeyExW
0x10010b8 HeapSetInformation
0x10010bc lstrcmpiW
0x10010c0 lstrlenW
0x10010c4 LCMapStringW
0x10010c8 RegQueryValueExW
0x10010cc ReleaseActCtx
0x10010d0 CreateActCtxW
0x10010d8 GetCommandLineW
0x10010dc ExitProcess
0x10010ec GetProcessHeap
0x10010f0 SetErrorMode
0x10010f8 LocalFree
0x10010fc HeapFree
0x1001100 WideCharToMultiByte
0x1001104 HeapAlloc
Library ntdll.dll:
0x100110c RtlAllocateHeap
0x1001110 RtlLengthRequiredSid
0x1001114 RtlSubAuthoritySid
0x1001118 RtlInitializeSid
0x100111c RtlCopySid
0x100112c RtlImageNtHeader
0x1001134 EtwEventWrite
0x1001138 EtwEventEnabled
0x100113c EtwEventRegister
0x1001140 RtlFreeHeap
Library API-MS-Win-Security-Base-L1-1-0.dll:
0x100114c AddAccessAllowedAce
0x1001158 GetTokenInformation
0x1001160 GetLengthSid
0x1001164 InitializeAcl
Library API-MS-WIN-Service-Core-L1-1-0.dll:
0x1001170 SetServiceStatus
Library API-MS-WIN-Service-winsvc-L1-1-0.dll:
Library RPCRT4.dll:
0x1001184 I_RpcMapWin32Status
0x1001188 RpcServerUnregisterIf
0x1001198 RpcServerRegisterIf
0x10011a0 RpcServerListen

!This program cannot be run in DOS mode.
`.data
@.reloc
msvcrt.dll
API-MS-Win-Core-ProcessThreads-L1-1-0.dll
KERNEL32.dll
NTDLL.DLL
API-MS-Win-Security-Base-L1-1-0.dll
API-MS-WIN-Service-Core-L1-1-0.dll
API-MS-WIN-Service-winsvc-L1-1-0.dll
RPCRT4.dll
SvchostPushServiceGlobals
ServiceMain
@PRPRh
t`j-Yf;
ole32.dll
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
CLSIDFromString
RPCRT4.dll
API-MS-WIN-Service-winsvc-L1-1-0.dll
API-MS-WIN-Service-Core-L1-1-0.dll
API-MS-Win-Security-Base-L1-1-0.dll
ntdll.dll
KERNEL32.dll
API-MS-Win-Core-ProcessThreads-L1-1-0.dll
msvcrt.dll
__wgetmainargs
_XcptFilter
_initterm
_amsg_exit
__setusermatherr
memcpy
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_cexit
TerminateProcess
GetCurrentProcess
OpenProcessToken
GetCurrentProcessId
GetCurrentThreadId
LocalAlloc
CloseHandle
DelayLoadFailureHook
GetProcAddress
GetLastError
FreeLibrary
InterlockedCompareExchange
LoadLibraryExA
InterlockedExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
UnhandledExceptionFilter
DeactivateActCtx
LoadLibraryExW
ActivateActCtx
LeaveCriticalSection
lstrcmpW
EnterCriticalSection
RegCloseKey
RegOpenKeyExW
HeapSetInformation
lstrcmpiW
lstrlenW
LCMapStringW
RegQueryValueExW
ReleaseActCtx
CreateActCtxW
ExpandEnvironmentStringsW
GetCommandLineW
ExitProcess
SetProcessAffinityUpdateMode
RegDisablePredefinedCacheEx
InitializeCriticalSection
GetProcessHeap
SetErrorMode
RegisterWaitForSingleObjectEx
LocalFree
HeapFree
WideCharToMultiByte
HeapAlloc
RtlAllocateHeap
RtlLengthRequiredSid
RtlSubAuthoritySid
RtlInitializeSid
RtlCopySid
RtlSubAuthorityCountSid
RtlInitializeCriticalSection
RtlSetProcessIsCritical
RtlImageNtHeader
RtlUnhandledExceptionFilter
EtwEventWrite
EtwEventEnabled
EtwEventRegister
RtlFreeHeap
SetSecurityDescriptorDacl
AddAccessAllowedAce
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
RpcMgmtSetServerStackSize
I_RpcMapWin32Status
RpcServerUnregisterIf
RpcMgmtWaitServerListen
RpcMgmtStopServerListening
RpcServerUnregisterIfEx
RpcServerRegisterIf
RpcServerUseProtseqEpW
RpcServerListen
svchost.pdb
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity
version="5.1.0.0"
processorArchitecture="x86"
name="Microsoft.Windows.Services.SvcHost"
type="win32"
<description>Host Process for Windows Services</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel
level="asInvoker"
uiAccess="false"
/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
3&373}3
4$4.4:4L4T4Z4j4
6)6<6D6[6~6/7J7
9L:R:X:]:h:
:N;X;];c;o;u;
=:=?=E=J=O=T=Y=_=g=r=x=
> >(>4>F>N>V>x>
?*?4?=?W?
1'101@1M1W1\1a1u1~1
2!2,222d2p2v2}2
3+383>3D3J3U3\3
5#5.53585=5C5I5N5U5[5n5
6%696?6E6a6p6
77'7-757;7C7I7Q7W7_7e7m7s7{7
8$888?8V8\8q8w8}8
9*959:9D9R9v9
?9?N?c?p?v?
161N1[1a1j1
1 262C2
33(3;3
5J6Q6a6z6
909@9F9L9R9X9^9d9j9p9v9|9
:=:Y:h:}:
=+=4=;=w=~=
0P4`4p4
5 505`5h5p5x5
Parameters
System\CurrentControlSet\Services
ServiceDllUnloadOnStop
nServiceMain
ServiceManifest
ServiceDll
Software\Microsoft\Windows NT\CurrentVersion\Svchost
SystemCritical
DefaultRpcStackSize
DeferredCoInitializeSecurityServices
CoInitializeSecurityAppID
AuthenticationCapabilities
ImpersonationLevel
AuthenticationLevel
CoInitializeSecurityParam
Software\Microsoft\Windows NT\CurrentVersion\MgdSvchost
ncacn_np
\PIPE\
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Host Process for Windows Services
FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)
InternalName
svchost.exe
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
svchost.exe
ProductName
Microsoft
Windows
Operating System
ProductVersion
6.1.7600.16385
VarFileInfo
Translation
No antivirus signatures available.
No IRMA results available.