× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f02e0db8be6d76904196319a3ad0efc511b841c796683738575dea627e1e7baa
File name: 456976
Detection ratio: 0 / 57
Analysis date: 2016-03-31 15:33:08 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20160331
AegisLab 20160331
AhnLab-V3 20160330
Alibaba 20160323
ALYac 20160331
Antiy-AVL 20160331
Arcabit 20160331
Avast 20160331
AVG 20160331
Avira (no cloud) 20160331
AVware 20160331
Baidu 20160331
Baidu-International 20160331
BitDefender 20160331
Bkav 20160331
CAT-QuickHeal 20160331
ClamAV 20160331
CMC 20160322
Comodo 20160331
Cyren 20160331
DrWeb 20160331
Emsisoft 20160331
ESET-NOD32 20160331
F-Prot 20160331
F-Secure 20160331
Fortinet 20160330
GData 20160331
Ikarus 20160331
Jiangmin 20160331
K7AntiVirus 20160331
K7GW 20160331
Kaspersky 20160331
Kingsoft 20160331
Malwarebytes 20160331
McAfee 20160331
McAfee-GW-Edition 20160331
Microsoft 20160331
eScan 20160331
NANO-Antivirus 20160331
nProtect 20160331
Panda 20160330
Qihoo-360 20160331
Rising 20160331
Sophos AV 20160331
SUPERAntiSpyware 20160331
Symantec 20160331
Tencent 20160331
TheHacker 20160330
TotalDefense 20160330
TrendMicro 20160331
TrendMicro-HouseCall 20160331
VBA32 20160331
VIPRE 20160331
ViRobot 20160331
Yandex 20160316
Zillya 20160331
Zoner 20160331
The file being studied is an Apple Disk Image! More specifically it follows the Universal Disk Image Format, commonly found with the DMG extension.
Main executable
Package path /Absolute Farkle f/Absolute Farkle.app/Contents/MacOS/Absolute Farkle
Detection ratio 0 / 57 when this report was generated
File size 788160 Bytes
HFS File ID 308
DMG HFS Property List
CFBundleInfoDictionaryVersion 4.3
LSRequiresCarbon True
DTXcodeBuild 4F250
CFBundleGetInfoString 4.3, Copyright 2003-2011, Gammonsoft
CFBundleIdentifier com.gammonsoft.AbsouteFarkle
CFBundleLongVersionString 4.3, Copyright 2003-2012 Gammonsoft
DTSDKName macosx10.6
DTPlatformVersion GM
CFBundleShortVersionString 4.3
BuildMachineOSBuild 12C60
New item
CFBundleExecutable Absolute Farkle
LSMinimumSystemVersion 10.5
CFBundleVersion 4.3
CFBundleIconFile AF.icns
DTPlatformBuild 4F250
DTXcode 0440
CFBundleDevelopmentRegion English
LSApplicationCategoryType public.app-category.board-games
DTCompiler
CFBundleSignature AFGM
DTSDKBuild 10K549
NSReadableCopyright Copyright 2003-2012 Gammonsoft
CFBundleName Absolute Farkle
CFBundlePackageType APPL
Contained Mac OS X executables
Contained file bundles
BLKX Table
Entry Attributes
whole disk (Apple_HFS : 0) 0x0050
DMG XML Property List
Entry Attributes
ID:0 0x0050
DMG structural properties
DMG version
4
Data fork offset
0x0
Data fork length
3913327
Resource fork offset
0x0
Resource fork length
0
Resource fork keys
blkx, plst
Running data fork offset
0x0
XML offset
0x3913327
XML length
6868
PLST keys
resource-fork
File identification
MD5 45ff05951d0453b35f4cbea91eded7e3
SHA1 bb495feba0ec10d4e5af905eccf10194c5fd52cc
SHA256 f02e0db8be6d76904196319a3ad0efc511b841c796683738575dea627e1e7baa
ssdeep
98304:RwCPv/4s01FLYuRYaEuV7Imkde30g+4v:Rvv/3uTLCe3F+

File size 3.7 MB ( 3920707 bytes )
File type Macintosh Disk Image
Magic literal
VAX COFF executable - version 28035

TrID ZLIB compressed data (var. 1) (100.0%)
Tags
dmg

VirusTotal metadata
First submission 2012-10-25 19:47:26 UTC ( 6 years, 7 months ago )
Last submission 2018-04-29 00:16:14 UTC ( 1 year ago )
File names AFarkle420.dmg
81011394
456976
AFarkle430.dmg
ExifTool file metadata
FileAccessDate
2014:05:27 02:28:32+01:00

FileCreateDate
2014:05:27 02:28:32+01:00

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.