× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ede16fb99fdf9249d47256615cd14767615874d7b3e201dd1a3fc2e1e1b041b9
File name: ede16fb99fdf9249d47256615cd14767615874d7b3e201dd1a3fc2e1e1b041b9
Detection ratio: 12 / 65
Analysis date: 2019-03-16 16:45:58 UTC ( 2 months ago )
Antivirus Result Update
Acronis suspicious 20190313
CrowdStrike Falcon (ML) win/malicious_confidence_90% (D) 20190212
Endgame malicious (high confidence) 20190215
Sophos ML heuristic 20190313
McAfee Emotet-FMI!74C06382A1AD 20190316
Microsoft Trojan:Win32/Fuerboos.A!cl 20190316
Qihoo-360 HEUR/QVM20.1.E297.Malware.Gen 20190316
Rising Trojan.Kryptik!8.8 (TFE:dGZlOgMPAP7Qmc8LBQ) 20190316
SentinelOne (Static ML) DFI - Malicious PE 20190311
Trapmine malicious.moderate.ml.score 20190301
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.SMF 20190316
VBA32 BScope.Malware-Cryptor.Emotet 20190315
Ad-Aware 20190316
AegisLab 20190316
AhnLab-V3 20190316
Alibaba 20190306
ALYac 20190316
Antiy-AVL 20190316
Arcabit 20190316
Avast 20190316
Avast-Mobile 20190316
AVG 20190316
Avira (no cloud) 20190316
Babable 20180918
Baidu 20190306
BitDefender 20190316
Bkav 20190314
CAT-QuickHeal 20190316
ClamAV 20190316
CMC 20190316
Comodo 20190316
Cybereason 20190109
Cyren 20190316
DrWeb 20190316
eGambit 20190316
Emsisoft 20190316
ESET-NOD32 20190316
F-Secure 20190316
Fortinet 20190316
GData 20190316
Ikarus 20190316
Jiangmin 20190316
K7AntiVirus 20190316
K7GW 20190315
Kaspersky 20190316
Kingsoft 20190316
Malwarebytes 20190316
MAX 20190316
McAfee-GW-Edition 20190316
eScan 20190316
NANO-Antivirus 20190316
Palo Alto Networks (Known Signatures) 20190316
Panda 20190316
Sophos AV 20190316
SUPERAntiSpyware 20190314
Symantec Mobile Insight 20190220
TACHYON 20190316
Tencent 20190316
TheHacker 20190315
TotalDefense 20190316
Trustlook 20190316
ViRobot 20190316
Yandex 20190315
Zillya 20190315
ZoneAlarm by Check Point 20190316
Zoner 20190316
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(c) Copyright 2016 StationPlaylist.com

Product StationPlaylist Recorder
Original name SPLRecorder.exe
File version 5.2.0.4
Description StationPlaylist Recorder
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 5:45 PM 3/16/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-16 16:35:13
Entry Point 0x00001730
Number of sections 4
PE sections
Overlays
MD5 7e7861f8ee0e169faa11ea8089f4741e
File type data
Offset 238080
Size 3336
Entropy 7.35
PE imports
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
GetStdHandle
FileTimeToSystemTime
GetOverlappedResult
SetEvent
EncodePointer
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
lstrcatA
FreeEnvironmentStringsW
lstrcatW
InitializeSListHead
SetStdHandle
GetCPInfo
InterlockedExchange
WriteFile
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
ResumeThread
GetOEMCP
LocalFree
FormatMessageW
ConnectNamedPipe
InitializeCriticalSection
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GetSystemTime
TlsGetValue
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
FlushFileBuffers
SetConsoleCtrlHandler
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetModuleHandleA
CreateThread
SetEnvironmentVariableW
DisconnectNamedPipe
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ClearCommError
ExitThread
DecodePointer
TerminateProcess
GetModuleHandleExW
GetCommState
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
CallNamedPipeW
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
TerminateThread
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatA
WaitForMultipleObjects
GetCommProperties
GetDateFormatW
GetStartupInfoW
GetUserDefaultLCID
GetProcessHeap
GetTimeFormatW
lstrcpyW
lstrcmpA
FindNextFileW
GetTimeFormatA
DuplicateHandle
FindFirstFileExW
GetProcAddress
SetCommTimeouts
CreateEventW
SetCommState
CreateFileW
CreateEventA
GetFileType
TlsSetValue
HeapAlloc
InterlockedIncrement
GetLastError
LocalReAlloc
LCMapStringW
CreateNamedPipeW
lstrlenA
GetConsoleCP
GetEnvironmentStringsW
lstrlenW
SetupComm
FileTimeToLocalFileTime
GetCurrentProcessId
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
SuspendThread
GetSystemDefaultLangID
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GetModuleHandleW
IsValidCodePage
OpenEventW
CreateProcessW
Sleep
IsBadReadPtr
VirtualAlloc
ResetEvent
Shell_NotifyIconW
GetWindowThreadProcessId
SendMessageTimeoutA
LoadStringA
GetTopWindow
MessageBoxA
SetForegroundWindow
Number of PE resources by type
RT_STRING 20
RT_BITMAP 13
RT_GROUP_CURSOR 9
RT_CURSOR 9
RT_RCDATA 5
RT_DIALOG 1
RT_ICON 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 56
ENGLISH NZ 4
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.2.0.4

LanguageCode
Unknown (1409)

FileFlagsMask
0x003f

FileDescription
StationPlaylist Recorder

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
114688

EntryPoint
0x1730

OriginalFileName
SPLRecorder.exe

MIMEType
application/octet-stream

LegalCopyright
(c) Copyright 2016 StationPlaylist.com

FileVersion
5.2.0.4

TimeStamp
2019:03:16 17:35:13+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
5.2

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
StationPlaylist.com

CodeSize
122368

ProductName
StationPlaylist Recorder

ProductVersionNumber
5.2.0.4

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 74c06382a1ad4ba01e45c88aeaae1c4a
SHA1 37297167a8baa599d4d01c7e9335d1461d246b6b
SHA256 ede16fb99fdf9249d47256615cd14767615874d7b3e201dd1a3fc2e1e1b041b9
ssdeep
3072:e+p/0A48k2GgrQCz+VGUbqPM902ypydViGZadC5iyHlVK5:LM9b29z+VGUQM9UpQdZ8iiZ

authentihash a57b7f92dcc865fb25f073e40a6e099c724f64bb16e8d9f32ea6399394aa1def
imphash 5c74f94ab03ea2089875be9678008a27
File size 235.8 KB ( 241416 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (35.0%)
Win64 Executable (generic) (31.0%)
Windows screen saver (14.7%)
Win32 Dynamic Link Library (generic) (7.3%)
Win32 Executable (generic) (5.0%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-16 16:45:58 UTC ( 2 months ago )
Last submission 2019-03-16 16:45:58 UTC ( 2 months ago )
File names SPLRecorder.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!