× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cc3b051ac802a513cfa2d33ad48a1974ad5e18e96fcc06f96512ac48660e667e
File name: TJO_U.exe
Detection ratio: 44 / 70
Analysis date: 2019-04-18 07:39:33 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190418
Ad-Aware Trojan.GenericKD.41208554 20190418
AegisLab Trojan.Multi.Generic.4!c 20190417
Alibaba Trojan:Win32/Emotet.a9e550fd 20190402
Arcabit Trojan.Generic.D274CAEA 20190417
Avast Win32:DangerousSig [Trj] 20190417
AVG Win32:DangerousSig [Trj] 20190417
Avira (no cloud) TR/Crypt.Agent.hoqtj 20190417
BitDefender Trojan.GenericKD.41208554 20190417
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190212
Cybereason malicious.fc3d0f 20190417
Cylance Unsafe 20190418
Cyren W32/Emotet.SO.gen!Eldorado 20190417
DrWeb Trojan.Emotet.685 20190417
Emsisoft Trojan.GenericKD.41208554 (B) 20190417
Endgame malicious (high confidence) 20190403
ESET-NOD32 a variant of Win32/Kryptik.GSEC 20190417
F-Prot W32/Emotet.SO.gen!Eldorado 20190417
F-Secure Trojan.TR/Crypt.Agent.hoqtj 20190416
FireEye Generic.mg.4c7db43fc3d0f93a 20190417
Fortinet W32/Kryptik.GRLK!tr 20190417
GData Trojan.GenericKD.41208554 20190417
Ikarus Win32.Outbreak 20190416
Sophos ML heuristic 20190313
K7AntiVirus Trojan ( 0054b5081 ) 20190417
K7GW Trojan ( 0054b5081 ) 20190417
Kaspersky Trojan-Banker.Win32.Emotet.cyzz 20190417
McAfee Trojan-FQPI!4C7DB43FC3D0 20190417
McAfee-GW-Edition Trojan-FQPI!4C7DB43FC3D0 20190416
Microsoft Trojan:Win32/Emotet.PA!MTB 20190417
eScan Trojan.GenericKD.41208554 20190417
Palo Alto Networks (Known Signatures) generic.ml 20190418
Panda Trj/GdSda.A 20190416
Qihoo-360 HEUR/QVM20.1.95DB.Malware.Gen 20190418
Rising Trojan.Emotet!8.B95 (TFE:3:3YtRw3TEikP) 20190417
SentinelOne (Static ML) DFI - Suspicious PE 20190407
Sophos AV Mal/Emotet-Q 20190417
Tencent Win32.Trojan.Falsesign.Pfab 20190418
Trapmine malicious.high.ml.score 20190325
TrendMicro TrojanSpy.Win32.EMOTET.SMTHF 20190417
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.SMTHF 20190417
VBA32 Malware-Cryptor.Kirgudu 20190416
ViRobot Trojan.Win32.Z.Emotet.112952.B 20190417
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cyzz 20190417
AhnLab-V3 20190417
ALYac 20190417
Antiy-AVL 20190417
Avast-Mobile 20190415
Babable 20180918
Baidu 20190318
Bkav 20190416
CAT-QuickHeal 20190416
ClamAV 20190416
CMC 20190321
Comodo 20190417
eGambit 20190418
Jiangmin 20190417
Kingsoft 20190418
Malwarebytes 20190417
MAX 20190418
MaxSecure 20190415
NANO-Antivirus 20190417
SUPERAntiSpyware 20190410
Symantec Mobile Insight 20190410
TACHYON 20190417
TheHacker 20190411
TotalDefense 20190416
Trustlook 20190418
Yandex 20190416
Zillya 20190416
Zoner 20190417
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name esentutl.exe
Internal name esentutl.exe
File version 6.1.7600.16385 (win7_rtm.090713-1255)
Description Extensible Storage Engine Utilities for Microsoft(R) Windows(R)
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 2:42 AM 4/25/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-04-16 16:07:05
Entry Point 0x000180D0
Number of sections 4
PE sections
Overlays
MD5 4919cda6ee9d8642935e394aeaca3305
File type data
Offset 109568
Size 3384
Entropy 7.34
PE imports
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
RegOpenKeyA
RegCloseKey
GetUserNameA
CopySid
RegQueryValueExA
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetValueExA
SystemFunction036
EqualSid
GetLengthSid
RegCreateKeyA
GetStdHandle
ReleaseMutex
InterlockedPopEntrySList
GetFileAttributesA
SetEvent
SetEndOfFile
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
CompareFileTime
GetConsoleMode
GetLocaleInfoA
LocalAlloc
lstrcatA
UnhandledExceptionFilter
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
InitializeSListHead
GetLocaleInfoW
SetFileAttributesA
GetFileTime
GetTempPathA
lstrcmpiA
GetCPInfo
GetOverlappedResult
GetStringTypeA
InterlockedExchange
FindResourceExW
MoveFileA
WaitForSingleObject
GetSystemTimeAsFileTime
GetThreadTimes
GetDiskFreeSpaceA
GetStringTypeW
GetFullPathNameA
GetExitCodeProcess
LocalFree
FormatMessageW
IsWow64Process
ConnectNamedPipe
InterlockedPushEntrySList
GetEnvironmentVariableA
LoadResource
FindClose
TlsGetValue
FormatMessageA
OutputDebugStringA
SetLastError
GetUserDefaultUILanguage
GetSystemTime
InitializeCriticalSection
lstrlenW
OutputDebugStringW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetVersionExA
lstrcpyW
GetModuleFileNameA
lstrcmpiW
RaiseException
HeapSetInformation
EnumSystemLocalesA
LoadLibraryExA
GetPrivateProfileStringA
GetSystemDefaultLCID
LoadLibraryExW
MultiByteToWideChar
VerifyVersionInfoW
SetFilePointerEx
FlushInstructionCache
CreateMutexA
SetFilePointer
CreateThread
TlsSetValue
GetSystemDefaultUILanguage
CreatePipe
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
GetSystemDirectoryA
DecodePointer
SetEnvironmentVariableA
GlobalMemoryStatus
SearchPathW
GetVersion
GetModuleHandleExW
GlobalAlloc
SearchPathA
CreateEventW
ReadConsoleW
GetCurrentThreadId
SetCurrentDirectoryA
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetWindowsDirectoryW
SetHandleInformation
GetFileSize
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetDateFormatW
GetStartupInfoW
GetUserDefaultLCID
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
GetTimeFormatW
WriteFile
ExpandEnvironmentStringsW
lstrcmpA
FindFirstFileExA
FindFirstFileA
WaitNamedPipeA
lstrcpyA
GetTempFileNameA
CreateFileMappingA
FindNextFileA
IsValidLocale
lstrcmpW
WaitForMultipleObjects
HeapCreate
GetProcAddress
GetTimeZoneInformation
CreateFileW
CreateEventA
CopyFileA
GetFileType
ReadConsoleOutputW
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
LCMapStringA
HeapReAlloc
CompareStringW
GetProcessTimes
GetEnvironmentStringsW
GlobalUnlock
VirtualQuery
CreateNamedPipeA
RemoveDirectoryA
GetShortPathNameA
VirtualFree
WaitForSingleObjectEx
GetEnvironmentStrings
GetCurrentDirectoryW
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
SetStdHandle
GetCommandLineA
UpdateResourceA
InterlockedCompareExchange
GetCurrentThread
QueryPerformanceFrequency
MapViewOfFile
TlsFree
GetModuleHandleA
VerSetConditionMask
ReadFile
CloseHandle
lstrcpynA
SetDllDirectoryW
GetACP
GlobalLock
GetModuleHandleW
GetFileAttributesExW
GetSystemTimeAdjustment
IsBadHugeWritePtr
SizeofResource
CreateProcessA
WideCharToMultiByte
IsValidCodePage
SetConsoleMode
GetTempPathW
CreateProcessW
Sleep
TerminateProcess
VirtualAlloc
GetOEMCP
SHQueryRecycleBinW
SHChangeNotify
SHFileOperationW
DragQueryFileA
SHGetDiskFreeSpaceA
SHBrowseForFolderA
SHQueryRecycleBinA
Shell_NotifyIcon
ExtractIconW
Shell_NotifyIconA
SHGetFileInfoA
ShellAboutA
ShellExecuteExA
SHCreateDirectoryExW
ExtractIconEx
SHCreateDirectoryExA
SHInvokePrinterCommandA
SHGetIconOverlayIndexW
SHGetDesktopFolder
SHGetMalloc
DragAcceptFiles
SHIsFileAvailableOffline
SHGetSpecialFolderPathA
SHGetDiskFreeSpaceExA
ExtractIconExA
DragQueryPoint
ExtractIconExW
FindExecutableW
CommandLineToArgvW
StrStrA
StrCmpNIW
StrStrIA
StrRChrIW
StrRStrIA
StrRChrIA
StrChrA
StrStrW
GetCursorPos
SendMessageA
GetForegroundWindow
GetQueueStatus
GetCapture
LoadIconW
GetClipboardOwner
FindWindowA
CoTaskMemAlloc
Number of PE resources by type
RT_RCDATA 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
12800

ImageVersion
0.0

ProductName
Microsoft Windows Operating System

FileVersionNumber
6.1.7600.16385

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
9.0

FileTypeExtension
exe

OriginalFileName
esentutl.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2019:04:16 18:07:05+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
esentutl.exe

ProductVersion
6.1.7600.16385

FileDescription
Extensible Storage Engine Utilities for Microsoft(R) Windows(R)

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
96256

FileSubtype
0

ProductVersionNumber
6.1.7600.16385

EntryPoint
0x180d0

ObjectFileType
Executable application

File identification
MD5 4c7db43fc3d0f93a0283d82b6d5ba29b
SHA1 1dc17c0dc10cecfc6272fac5eaac351ba394ab7e
SHA256 cc3b051ac802a513cfa2d33ad48a1974ad5e18e96fcc06f96512ac48660e667e
ssdeep
1536:Z2pA1smwOkrWfEwNeXV7C1X7+XZxWvch6sFJpNYFsQsIx2P4iBi5A/ngFPW:8prd/SfEPdCN+TWvchpkjp2PLi5A/ghW

authentihash d7b7a18acd9d91f83462d597712df83fe23302a48de838736c9e488739707eae
imphash 2fd0332d3108e86ea16aa09724462c1f
File size 110.3 KB ( 112952 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-04-16 16:29:47 UTC ( 1 month, 1 week ago )
Last submission 2019-04-25 00:42:13 UTC ( 1 month ago )
File names esentutl.exe
TJO_U.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Moved files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections