× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 486acc11b390e1d3698e39a52e8fbef12e3ecde0c72a1b4a9bf7c9cd25f61411
Detection ratio: 0 / 60
Analysis date: 2018-01-07 01:48:02 UTC ( 6 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20180106
AegisLab 20180105
AhnLab-V3 20180106
Alibaba 20180105
ALYac 20180106
Antiy-AVL 20180106
Arcabit 20180106
Avast 20180106
Avast-Mobile 20180105
AVG 20180106
Avira (no cloud) 20180106
AVware 20180103
Baidu 20180105
BitDefender 20180106
Bkav 20180106
CAT-QuickHeal 20180106
ClamAV 20180106
CMC 20180106
Comodo 20180107
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180107
Cyren 20180106
DrWeb 20180107
eGambit 20180107
Emsisoft 20180106
Endgame 20171130
ESET-NOD32 20180106
F-Prot 20180107
F-Secure 20180107
Fortinet 20180106
GData 20180107
Ikarus 20180106
Sophos ML 20170914
Jiangmin 20180107
K7AntiVirus 20180106
K7GW 20180106
Kaspersky 20180107
Kingsoft 20180107
Malwarebytes 20180107
MAX 20180107
McAfee 20180102
McAfee-GW-Edition 20180106
Microsoft 20180107
eScan 20180107
NANO-Antivirus 20180107
nProtect 20180107
Palo Alto Networks (Known Signatures) 20180107
Panda 20180106
Qihoo-360 20180107
Rising 20180106
SentinelOne (Static ML) 20171224
Sophos AV 20180106
SUPERAntiSpyware 20180106
Symantec 20180106
Tencent 20180107
TheHacker 20180103
TotalDefense 20180106
TrendMicro 20180107
TrendMicro-HouseCall 20180106
Trustlook 20180107
VBA32 20180105
VIPRE 20180106
ViRobot 20180106
Webroot 20180107
WhiteArmor 20171226
Yandex 20171229
Zillya 20180105
ZoneAlarm by Check Point 20180106
Zoner 20180107
The file being studied is an Apple Disk Image! More specifically it follows the Universal Disk Image Format, commonly found with the DMG extension.
Main executable
Package path /Screencast-O-Matic.app/Contents/MacOS/launcher
Detection ratio 0 / 55 when this report was generated
File size 66408 Bytes
HFS File ID 33
DMG HFS Property List
somPartnerId som
JVMArguments open
CFBundleShortVersionString 1.3
CFBundleVersion 1
CFBundleSignature ????
CFBundleInfoDictionaryVersion 6.0
CFBundleDisplayName SOM Process Helper
CFBundleIconFile dockIcon.icns
NSHumanReadableCopyright 2013 Screencast-O-Matic
CFBundleIdentifier com.screencastomatic.app
JVMOptions -Dsom.app.path=$APP_ROOT
-Dsom.resources.path=$APP_ROOT/Contents/SOM
-Dsom.launcher.path=$APP_ROOT/Contents/MacOS/launcher
LSUIElement True
CFBundleExecutable launcher
CFBundleName ScreencastOMatic
CFBundlePackageType APPL
LSApplicationCategoryType public.app-category.video
CFBundleDevelopmentRegion English
JVMMainClassName com/screencastomatic/tray/TrayMain
Contained Mac OS X executables
Contained file bundles
BLKX Table
Entry Attributes
Driver Descriptor Map (DDM : 0) 0x0050
Apple (Apple_partition_map : 1) 0x0050
disk image (Apple_HFS : 2) 0x0050
DMG XML Property List
Entry Attributes
ID:0 0x0050
DMG structural properties
DMG version
4
Data fork offset
0x0
Data fork length
4472192
Resource fork offset
0x0
Resource fork length
0
Resource fork keys
blkx, plst
Running data fork offset
0x0
XML offset
0x4472192
XML length
6430
PLST keys
resource-fork
File identification
MD5 a17564ed0176ac2283ecc0887d681649
SHA1 840eed9c0338049d0dda75621a0595b93674d2cc
SHA256 486acc11b390e1d3698e39a52e8fbef12e3ecde0c72a1b4a9bf7c9cd25f61411
ssdeep
98304:PvyChL+4rNU0A+QxKVeLDaoGVy+HWK+X087YGEr91znZ:SChqMa0FQ4ULDaoeHV+R7/Er7jZ

File size 4.3 MB ( 4479134 bytes )
File type Macintosh Disk Image
Magic literal
VAX COFF executable - version 376

TrID ZLIB compressed data (var. 1) (100.0%)
Tags
dmg

VirusTotal metadata
First submission 2015-01-29 09:02:50 UTC ( 3 years, 5 months ago )
Last submission 2018-05-23 10:17:02 UTC ( 1 month, 3 weeks ago )
File names InstallScreencastOMatic-Mac10.6-v1.4.dmg
ExifTool file metadata
FileAccessDate
2015:01:29 10:02:58+01:00

FileCreateDate
2015:01:29 10:02:58+01:00

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
HTTP requests
DNS requests
TCP connections