× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 143969e8eaed6269ac6c55e2a861cdde81947e7c45e5d27e939d4bbb1c9ac8cd
File name: file.tmp
Detection ratio: 0 / 43
Analysis date: 2012-03-19 19:08:07 UTC ( 7 years, 2 months ago ) View latest
Antivirus Result Update
AhnLab-V3 20120318
AntiVir 20120319
Antiy-AVL 20120319
Avast 20120317
AVG 20120319
BitDefender 20120319
ByteHero 20120319
CAT-QuickHeal 20120319
ClamAV 20120319
Commtouch 20120319
Comodo 20120319
DrWeb 20120319
Emsisoft 20120319
eSafe 20120315
eTrust-Vet 20120319
F-Prot 20120319
F-Secure 20120319
Fortinet 20120319
GData 20120319
Ikarus 20120319
Jiangmin 20120319
K7AntiVirus 20120316
Kaspersky 20120319
McAfee 20120318
McAfee-GW-Edition 20120319
Microsoft 20120319
NOD32 20120319
Norman 20120318
nProtect 20120319
Panda 20120319
PCTools 20120314
Prevx 20120319
Rising 20120319
Sophos AV 20120319
SUPERAntiSpyware 20120317
Symantec 20120319
TheHacker 20120318
TrendMicro 20120319
TrendMicro-HouseCall 20120319
VBA32 20120319
VIPRE 20120319
ViRobot 20120319
VirusBuster 20120319
The file being studied is a Mac OS X executable! More specifically it is a executable file Mach-O for x86_64 based machines.
File header
File type executable file
Magic 0xfeedfacf
Required architecture x86_64
Sub-architecture X86_64_ALL
Entry point 0x100001508
Reserved 0x0
Load commands 11
Load commands size 1776
File segments
Shared libraries
Load commands
File identification
MD5 39084b60790ca3fdebe1cd93a4764819
SHA1 13e380e5353a4ec9903ff76d27b1197fc7c3d704
SHA256 143969e8eaed6269ac6c55e2a861cdde81947e7c45e5d27e939d4bbb1c9ac8cd

File size 58.7 KB ( 60100 bytes )
File type Mach-O
Magic literal
Mach-O 64-bit executable

TrID Mac OS X Mach-O 64bit Intel executable (100.0%)
64bits macho

VirusTotal metadata
First submission 2012-03-19 19:08:07 UTC ( 7 years, 2 months ago )
Last submission 2014-05-12 21:47:46 UTC ( 5 years ago )
File names jL4a.jpg
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
HTTP requests
DNS requests
TCP connections