× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 013623e5e50449bbdf6943549d8224a122aa6c42bd3300a1bd2b743b01ae6793
File name: Handbrake.dmg.exe
Detection ratio: 30 / 59
Analysis date: 2017-12-26 12:58:08 UTC ( 4 weeks ago )
Antivirus Result Update
Ad-Aware Trojan.MAC.Proton.A 20171225
AhnLab-V3 BinImage/Proton 20171226
ALYac Trojan.OSX.Proton 20171226
Antiy-AVL Trojan[Backdoor]/OSX.Proton 20171226
Arcabit Trojan.MAC.Proton.A 20171226
Avast MacOS:Proton-A [Trj] 20171226
AVG MacOS:Proton-A [Trj] 20171226
Avira (no cloud) OSX/Proton.uoopm 20171226
BitDefender Trojan.MAC.Proton.A 20171226
ClamAV Osx.Trojan.Proton-6316148-0 20171226
Comodo UnclassifiedMalware 20171226
Cyren Trojan.INJM-7 20171226
DrWeb Mac.BackDoor.Proton.1 20171226
Emsisoft Trojan.MAC.Proton.A (B) 20171226
ESET-NOD32 OSX/Proton.A 20171226
F-Secure Backdoor:OSX/Proton.A 20171226
GData Trojan.MAC.Proton.A 20171226
Ikarus Trojan.OSX.Proton.A 20171226
Kaspersky HEUR:Backdoor.OSX.Proton.b 20171226
MAX malware (ai score=86) 20171226
McAfee OSX/Generics.p 20171226
McAfee-GW-Edition OSX/Generics.p 20171226
eScan Trojan.MAC.Proton.A 20171226
NANO-Antivirus Trojan.Mac.Proton.eokpjt 20171226
Sophos AV OSX/Proton-A 20171226
Symantec OSX.Dropper 20171225
TrendMicro OSX_PROTON.A 20171226
TrendMicro-HouseCall OSX_PROTON.A 20171226
Zillya Backdoor.Proton.OSX.8 20171226
ZoneAlarm by Check Point HEUR:Backdoor.OSX.Proton.b 20171226
AegisLab 20171226
Alibaba 20171226
Avast-Mobile 20171226
AVware 20171226
Baidu 20171226
Bkav 20171226
CAT-QuickHeal 20171226
CMC 20171226
CrowdStrike Falcon (ML) 20171016
Cybereason None
Cylance 20171226
eGambit 20171226
Endgame 20171130
F-Prot 20171226
Fortinet 20171226
Sophos ML 20170914
Jiangmin 20171226
K7AntiVirus 20171226
K7GW 20171226
Kingsoft 20171226
Malwarebytes 20171226
Microsoft 20171226
nProtect 20171226
Palo Alto Networks (Known Signatures) 20171226
Panda 20171225
Qihoo-360 20171226
Rising 20171226
SentinelOne (Static ML) 20171224
SUPERAntiSpyware 20171226
Symantec Mobile Insight 20171222
Tencent 20171226
TheHacker 20171219
Trustlook 20171226
VBA32 20171226
VIPRE 20171226
ViRobot 20171226
Webroot 20171226
WhiteArmor 20171204
Yandex 20171225
Zoner 20171226
The file being studied is an Apple Disk Image! More specifically it follows the Universal Disk Image Format, commonly found with the DMG extension.
Main executable
Package path /HandBrake.app/Contents/Frameworks/Sparkle.framework/Versions/A/Resources/Autoupdate.app/Contents/MacOS/Autoupdate
Detection ratio 0 / 57 when this report was generated
File size 166964 Bytes
HFS File ID 80
DMG HFS Property List
SUFeedURL https://handbrake.fr/appcast.x86_64.xml
CFBundleInfoDictionaryVersion 6.0
NSHumanReadableCopyright Copyright © 2003-2017 HandBrake Team. GPLv2 license.
CFBundleGetInfoString 2017042800
CFBundleIdentifier fr.handbrake.HandBrake
CFBundleDocumentTypes {u'CFBundleTypeName': u'All files', u'CFBundleTypeRole': u'Viewer', u'CFBundleTypeExtensions': [u'*']}
{u'CFBundleTypeRole': u'Viewer', u'LSItemContentTypes': [u'public.movie']}
SUAllowsAutomaticUpdates False
CFBundleShortVersionString 1.0.7
CFBundleDisplayName HandBrake
BuildMachineOSBuild 15F34
CFBundleExecutable HandBrake
LSMinimumSystemVersion 10.7
CFBundleVersion 2017042800
SUPublicDSAKeyFile dsa_pub.pem
CFBundleIconFile HandBrake
NSMainNibFile MainMenu
CFBundleDevelopmentRegion en
CFBundleSupportedPlatforms MacOSX
CFBundleSignature ????
CFBundleName HandBrake
CFBundlePackageType APPL
NSPrincipalClass HBApplication
Contained Mac OS X executables
Contained file bundles
BLKX Table
Entry Attributes
Protective Master Boot Record (MBR : 0) 0x0050
GPT Header (Primary GPT Header : 1) 0x0050
GPT Partition Data (Primary GPT Table : 2) 0x0050
(Apple_Free : 3) 0x0050
disk image (Apple_HFS : 4) 0x0050
(Apple_Free : 5) 0x0050
GPT Partition Data (Backup GPT Table : 6) 0x0050
GPT Header (Backup GPT Header : 7) 0x0050
DMG XML Property List
Entry Attributes
ID:0 0x0050
DMG structural properties
DMG version
Data fork offset
Data fork length
Resource fork offset
Resource fork length
Resource fork keys
blkx, plst
Running data fork offset
XML offset
XML length
PLST keys
File identification
MD5 e420a2dfb206c8777002583637037d29
SHA1 0935a43ca90c6c419a49e4f8f1d75e68cd70b274
SHA256 013623e5e50449bbdf6943549d8224a122aa6c42bd3300a1bd2b743b01ae6793

File size 15.8 MB ( 16593112 bytes )
File type Macintosh Disk Image
Magic literal
x86 boot sector

TrID Macintosh Disk image (BZlib compressed) (97.6%)
ZLIB compressed data (var. 1) (2.3%)
Master Boot Record dump (0.0%)

VirusTotal metadata
First submission 2017-05-03 19:01:45 UTC ( 8 months, 3 weeks ago )
Last submission 2017-12-26 12:58:08 UTC ( 4 weeks ago )
File names HandBrake-1.0.7.dmg
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
HTTP requests
DNS requests
TCP connections