× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d6aeb205f8fd9318149bc3a3e6955d14cf60caac58746cf5ca46f3fd0433180d
File name: 834163
Detection ratio: 0 / 56
Analysis date: 2016-04-13 23:16:33 UTC ( 2 years, 5 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160413
AegisLab 20160413
AhnLab-V3 20160413
Alibaba 20160413
ALYac 20160413
Antiy-AVL 20160413
Arcabit 20160413
Avast 20160413
AVG 20160413
AVware 20160413
Baidu 20160413
Baidu-International 20160413
BitDefender 20160413
Bkav 20160413
CAT-QuickHeal 20160413
ClamAV 20160412
CMC 20160412
Comodo 20160413
Cyren 20160413
DrWeb 20160413
Emsisoft 20160413
ESET-NOD32 20160413
F-Prot 20160414
F-Secure 20160414
Fortinet 20160413
GData 20160414
Ikarus 20160413
Jiangmin 20160413
K7AntiVirus 20160413
K7GW 20160404
Kaspersky 20160413
Kingsoft 20160414
Malwarebytes 20160413
McAfee 20160413
McAfee-GW-Edition 20160413
Microsoft 20160413
eScan 20160413
NANO-Antivirus 20160413
nProtect 20160412
Panda 20160413
Qihoo-360 20160414
Rising 20160413
Sophos AV 20160413
SUPERAntiSpyware 20160413
Symantec 20160413
Tencent 20160414
TheHacker 20160412
TotalDefense 20160413
TrendMicro 20160413
TrendMicro-HouseCall 20160413
VBA32 20160413
VIPRE 20160413
ViRobot 20160413
Yandex 20160412
Zillya 20160413
Zoner 20160413
The file being studied is an Apple Disk Image! More specifically it follows the Universal Disk Image Format, commonly found with the DMG extension.
File signature
Identifier com.Wondershare.Video_Converter
Format bundle with Mach-O thin (i386)
CDHash b82259586a66aeae54de25c5a6cc599c367fdb51
Signature size 8544
Authority Developer ID Application: Wondershare Software Co., Ltd
Authority Developer ID Certification Authority
Authority Apple Root CA
Timestamp Apr 5, 2016, 3:38:09 AM
Info.plist entries 44
TeamIdentifier YZC2T44ZDX
DMG HFS Property List
CFBundleIdentifier com.bugsplatsoftware.bugsplatreporter
DTCompiler com.apple.compilers.llvm.clang.1_0
CFBundleSignature ????
CFBundleInfoDictionaryVersion 6.0
BuildMachineOSBuild 14D136
CFBundleIconFile BugSplat.icns
DTPlatformBuild 6D1002
DTXcodeBuild 6D1002
DTPlatformVersion GM
DTXcode 0631
CFBundleDevelopmentRegion English
DTSDKName macosx10.10
DTSDKBuild 14D125
CFBundleName BugsplatReporter
NSMainNibFile MainMenu
CFBundleVersion 1.0
NSPrincipalClass NSApplication
CFBundlePackageType APPL
CFBundleExecutable BugsplatReporter
Contained Mac OS X executables
Contained file bundles
BLKX Table
Entry Attributes
Driver Descriptor Map(DDM:0) Driver Descriptor Map(DDM:0) 0x0050
Apple(Apple_partition_map:1) Apple(Apple_partition_map:1) 0x0050
disk image(Apple_HFS:2) disk image(Apple_HFS:2) 0x0050
DMG XML Property List
Entry Attributes
ID:0 0x0050
DMG structural properties
DMG version
4
Data fork offset
0x0
Data fork length
41180336
Resource fork offset
0x0
Resource fork length
0
Resource fork keys
blkx, plst
Running data fork offset
0x0
XML offset
0x41180336
XML length
11706
PLST keys
resource-fork
File identification
MD5 006f860929c4fdbf4805788355ad0c07
SHA1 b80837397c090372748c6483effd8ebb351a1dde
SHA256 d6aeb205f8fd9318149bc3a3e6955d14cf60caac58746cf5ca46f3fd0433180d
ssdeep
786432:cwe/yTk2Slj3uw5GbkxL2JsqVjY41jjlGJGZGQjGvEwWE93:cwNk2SlTuw8bkxCiq9ljloGN8EwW

File size 39.3 MB ( 41192554 bytes )
File type Macintosh Disk Image
Magic literal
bzip2 compressed data, block size = 100k

TrID bzip2 compressed archive (100.0%)
Tags
dmg

VirusTotal metadata
First submission 2016-04-13 23:16:33 UTC ( 2 years, 5 months ago )
Last submission 2016-04-13 23:16:33 UTC ( 2 years, 5 months ago )
File names 834163
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files