× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 124180c295e28649110b39c67bdd35292e361f65fd33c9d533db1b814e1953c2
File name: 81ed37b9750182ddb755f34c8db0e603
Detection ratio: 0 / 57
Analysis date: 2016-05-07 11:39:16 UTC ( 3 years ago ) View latest
Antivirus Result Update
Ad-Aware 20160507
AegisLab 20160507
AhnLab-V3 20160506
Alibaba 20160506
ALYac 20160507
Antiy-AVL 20160507
Arcabit 20160507
Avast 20160507
AVG 20160507
Avira (no cloud) 20160507
AVware 20160507
Baidu 20160506
Baidu-International 20160507
BitDefender 20160507
Bkav 20160506
CAT-QuickHeal 20160507
ClamAV 20160507
CMC 20160506
Comodo 20160507
Cyren 20160507
DrWeb 20160507
Emsisoft 20160503
ESET-NOD32 20160507
F-Prot 20160507
F-Secure 20160507
Fortinet 20160507
GData 20160507
Ikarus 20160507
Jiangmin 20160507
K7AntiVirus 20160507
K7GW 20160507
Kaspersky 20160507
Kingsoft 20160507
Malwarebytes 20160507
McAfee 20160507
McAfee-GW-Edition 20160507
Microsoft 20160507
eScan 20160507
NANO-Antivirus 20160507
nProtect 20160504
Panda 20160507
Qihoo-360 20160507
Rising 20160507
Sophos AV 20160507
SUPERAntiSpyware 20160507
Symantec 20160507
Tencent 20160507
TheHacker 20160505
TotalDefense 20160507
TrendMicro 20160507
TrendMicro-HouseCall 20160507
VBA32 20160505
VIPRE 20160507
ViRobot 20160507
Yandex 20160506
Zillya 20160507
Zoner 20160507
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.amdroid.pedo.gas.flatulencia. The internal version number of the application is 20. The displayed version string of the application is Fart v20. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.amdroid.pedo.gas.flatulencia.Agitacelular
com.amdroid.pedo.gas.flatulencia.MainActivity
com.amdroid.pedo.gas.flatulencia.Main
com.amdroid.pedo.gas.flatulencia.Pedosensible
com.amdroid.pedo.gas.flatulencia.Pedobomba
com.amdroid.pedo.gas.flatulencia.Pedocompartir
com.amdroid.pedo.gas.flatulencia.Chatweb
com.amdroid.pedo.gas.flatulencia.Chat
com.amdroid.pedo.gas.flatulencia.Pedopiano
com.amdroid.pedo.gas.flatulencia.GoToFacebook
com.facebook.FacebookActivity
com.google.android.gms.ads.AdActivity
com.amdroid.pedo.gas.flatulencia.PlayerControlsDemoActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
Receivers
com.google.android.gms.wallet.EnableWalletOptimizationReceiver
Providers
com.facebook.FacebookContentProvider
Activity-related intent filters
com.amdroid.pedo.gas.flatulencia.Main
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.google.android.gms.wallet.EnableWalletOptimizationReceiver
actions: com.google.android.gms.wallet.ENABLE_WALLET_OPTIMIZATION
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
762
Uncompressed size
5918041
Highest datetime
2015-07-16 03:29:42
Lowest datetime
2015-07-16 03:29:16
Contained files by extension
png
536
xml
183
ogg
16
mp3
9
wav
7
jpg
5
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
536
XML
183
OGG
16
unknown
13
MP3
8
JPG
5
DEX
1
File identification
MD5 81ed37b9750182ddb755f34c8db0e603
SHA1 aa9db78e9f0b5298ce7e323b0bb4a302bf9ad6b3
SHA256 124180c295e28649110b39c67bdd35292e361f65fd33c9d533db1b814e1953c2
ssdeep
98304:44kK9ASB9HjrWFOGA/GM9J1IuXlh3EGBTyPa5u:xH2b+GM71IKj3rWa5u

File size 3.6 MB ( 3819173 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android dyn-class

VirusTotal metadata
First submission 2015-07-16 13:46:04 UTC ( 3 years, 10 months ago )
Last submission 2018-02-17 06:50:55 UTC ( 1 year, 3 months ago )
File names pedo-sonido-gratis.apk
pedo-sonido-gratis.apk
0047e7c50fba70d2864c05089b8659d81396e5c0a3df2572581cbd5df10e93236062ae1d0b3f060a9fb7ae56c88593af375bde512e119e202c0f5c977879ce8c
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.INTERNET:com.amdroid.pedo.gas.flatulencia
android.permission.ACCESS_NETWORK_STATE:com.amdroid.pedo.gas.flatulencia
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
android.intent.action.BATTERY_CHANGED
Opened files
/data/data/com.amdroid.pedo.gas.flatulencia/cache/ads-1832316684.jar
https:/googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html
/data/data/com.amdroid.pedo.gas.flatulencia/cache
/data/data/com.amdroid.pedo.gas.flatulencia/databases/com.google.android.gms.ads.db
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Dynamically loaded classes
com.google.android.ads.zxxz.e
com.google.android.ads.zxxz.l
com.google.android.ads.zxxz.i
com.google.android.ads.zxxz.g
com.google.android.ads.zxxz.m
com.google.android.ads.zxxz.f
com.google.android.ads.zxxz.k
com.google.android.ads.zxxz.j
com.google.android.ads.zxxz.d
com.google.android.ads.zxxz.c
com.google.android.ads.zxxz.b
com.google.android.ads.zxxz.h
com.google.android.ads.zxxz.a
Accessed URIs
geo:0,0?q=donuts
http://www.google.com
market://details?id=com.google.android.gms.ads
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html