svchost10.exe

The executable svchost10.exe has been detected as malware by 36 anti-virus scanners. While running, it connects to the Internet address text-lb.esams.wikimedia.org on port 443.
MD5:
4ade54194e7b7e839d81ccf615c68e8a

SHA-1:
f3434852f5e6c8d856ba6927c12cab66c94e5609

SHA-256:
5608d153c774a711bd1075b8a8686887bed9badcab460c9a8a342396c3d82dfb

Scanner detections:
36 / 68

Status:
Malware

Analysis date:
4/16/2024 11:06:24 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.471784
551

AhnLab V3 Security
HEUR/Fakon.mwf
2015.03.12

Avira AntiVirus
TR/Patched.Gen
7.11.216.36

avast!
Win32:Patched-AFV [Trj]
2014.9-150803

AVG
Agent5
2016.0.3029

Baidu Antivirus
Trojan.Win32.Dropper
4.0.3.1583

Bitdefender
Gen:Variant.Kazy.471784
1.0.20.1075

Bkav FE
W32.HfsAutoA
1.3.0.6379

Clam AntiVirus
Win.Trojan.Agent-803537
0.98/21511

Comodo Security
TrojWare.Win32.Dapato.DFS
21372

Dr.Web
Trojan.DownLoader11.18798
9.0.1.0215

Emsisoft Anti-Malware
Gen:Variant.Kazy.471784
8.15.08.03.05

ESET NOD32
Win32/Agent.NPN worm
9.7.0.302.0

Fortinet FortiGate
W32/Dapato.EDU!tr
8/3/2015

F-Prot
W32/Virut.AI!Generic
v6.4.6.5.141

F-Secure
Gen:Variant.Kazy.471784
11.2015-03-08_2

G Data
Gen:Variant.Kazy.471784
15.8.25

herdProtect (fuzzy)
2015.9.8.0

IKARUS anti.virus
Trojan-Dropper.Win32.Dapato
t3scan.1.8.6.0

K7 AntiVirus
Trojan
13.200.15229

Kaspersky
Trojan-Dropper.Win32.Dapato
14.0.0.1639

Malwarebytes
Backdoor.Bot
v2015.08.03.05

Microsoft Security Essentials
Threat.Undefined
1.203.968.0

MicroWorld eScan
Gen:Variant.Kazy.471784
16.0.0.645

NANO AntiVirus
Trojan.Win32.Dapato.dbzcxx
0.30.0.296

Norman
Obfuscated.H!genr
11.20150803

nProtect
Trojan-Dropper/W32.Dapato.82432.G
15.03.11.01

Panda Antivirus
Trj/Genetic.gen
15.08.03.05

Sophos
Troj/Wonton-MP
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Dropper
9715

Total Defense
Win32/FakeFLDR_i
37.0.11489

Trend Micro House Call
Mal_OtorunP
7.2.215

Trend Micro
Mal_OtorunP
10.465.03

Vba32 AntiVirus
TrojanDropper.Dapato
3.12.26.3

VIPRE Antivirus
Threat.4657539
41424

Zillya! Antivirus
Virus.Virut.Win32.25
2.0.0.2093

File size:
80.5 KB (82,432 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\svchost10.exe

File PE Metadata
Compilation timestamp:
2/20/2010 12:44:55 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
1536:J88OoVM1q8ewf1OO53i6EBXlLOUpCpnKsP6JWkZwZzCD7brRMUyep:WpoG1zjdOOqLOUpCp1y4kmzQbOqp

Entry address:
0x3C67

Entry point:
E8, 9C, 04, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, F8, 81, 40, 00, 89, 0D, F4, 81, 40, 00, 89, 15, F0, 81, 40, 00, 89, 1D, EC, 81, 40, 00, 89, 35, E8, 81, 40, 00, 89, 3D, E4, 81, 40, 00, 66, 8C, 15, 10, 82, 40, 00, 66, 8C, 0D, 04, 82, 40, 00, 66, 8C, 1D, E0, 81, 40, 00, 66, 8C, 05, DC, 81, 40, 00, 66, 8C, 25, D8, 81, 40, 00, 66, 8C, 2D, D4, 81, 40, 00, 9C, 8F, 05, 08, 82, 40, 00, 8B, 45, 00, A3, FC, 81, 40, 00, 8B, 45, 04, A3, 00, 82, 40, 00, 8D, 45, 08, A3, 0C, 82, 40...
 
[+]

Entropy:
6.6718

Code size:
14.5 KB (14,848 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to text-lb.esams.wikimedia.org  (91.198.174.192:443)

TCP (HTTP SSL):
Connects to text-lb.eqiad.wikimedia.org  (208.80.154.224:443)

Remove svchost10.exe - Powered by Reason Core Security