× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1ad180388362abffe1826853b6a07c74ff4d43022b1e4b9f675786d10b0f92ce
File name: legion-of-heroes-1.9.02.apk
Detection ratio: 0 / 62
Analysis date: 2017-08-04 19:08:07 UTC ( 1 year, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170804
AegisLab 20170804
AhnLab-V3 20170804
Alibaba 20170804
ALYac 20170804
Antiy-AVL 20170804
Arcabit 20170804
Avast 20170804
AVG 20170804
Avira (no cloud) 20170804
AVware 20170804
Baidu 20170804
BitDefender 20170804
Bkav 20170804
CAT-QuickHeal 20170804
ClamAV 20170804
CMC 20170804
Comodo 20170804
CrowdStrike Falcon (ML) 20170710
Cylance 20170804
Cyren 20170804
DrWeb 20170804
Emsisoft 20170804
Endgame 20170721
ESET-NOD32 20170804
F-Prot 20170804
F-Secure 20170804
Fortinet 20170804
GData 20170804
Ikarus 20170804
Sophos ML 20170607
Jiangmin 20170804
K7AntiVirus 20170804
K7GW 20170804
Kaspersky 20170804
Kingsoft 20170804
Malwarebytes 20170804
MAX 20170804
McAfee 20170804
McAfee-GW-Edition 20170804
Microsoft 20170804
eScan 20170804
NANO-Antivirus 20170804
nProtect 20170804
Palo Alto Networks (Known Signatures) 20170804
Panda 20170804
Qihoo-360 20170804
Rising 20170804
SentinelOne (Static ML) 20170718
Sophos AV 20170804
SUPERAntiSpyware 20170804
Symantec 20170804
Tencent 20170804
TheHacker 20170804
TotalDefense 20170804
TrendMicro 20170804
TrendMicro-HouseCall 20170804
Trustlook 20170804
VBA32 20170803
VIPRE 20170804
ViRobot 20170804
Webroot 20170804
WhiteArmor 20170731
Yandex 20170801
Zillya 20170804
ZoneAlarm by Check Point 20170804
Zoner 20170804
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nexonm.loh.usios. The internal version number of the application is 1902. The displayed version string of the application is 1.9.02. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
com.nexonm.loh.usios.permission.C2D_MESSAGE (C2DM permission.)
android.permission.INTERNET (full Internet access)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.KILL_BACKGROUND_PROCESS (Unknown permission from android reference)
android.permission.RESTART_PACKAGES (kill background processes)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nexonm.loh.usios.AndroidAPI
com.nexonm.loh.usios.MyAlert
com.tapjoy.TJAdUnitActivity
com.tapjoy.TJContentActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.facebook.LoginActivity
com.nexon.android.ui.NPLoginActivity
kr.co.nexon.toy.android.ui.auth.NXToyLoginSelectActivity
kr.co.nexon.toy.android.ui.auth.NXToyTermsActivity
kr.co.nexon.toy.android.ui.auth.NXToyTermViewActivity
com.nexon.android.ui.NXJoinUserAuthWebActivity
com.nexon.android.ui.NXJoinWebActivity
com.nexon.android.ui.NXJoinSelectActivity
com.nexon.android.ui.NXUserAuthWebActivity
kr.co.nexon.toy.android.ui.etc.NXToyShareActivity
kr.co.nexon.toy.android.ui.banner.NXToyFullBannerActivity
com.nexon.android.ui.NXSearchIDPWActivity
com.nexon.android.ui.NPGetNexonSNActivity
kr.co.nexon.toy.android.ui.banner.NXToyEndingBannerActivity
kr.co.nexon.toy.android.ui.board.NXToyNoticeActivity
kr.co.nexon.toy.android.ui.etc.NXToyCouponActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyCustomerServiceActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyHelpCenterActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyPlateActivity
kr.co.nexon.toy.android.ui.board.NXToyWebActivity
kr.co.nexon.toy.android.ui.board.NXToyCSActivity
kr.co.nexon.toy.android.ui.board.NXToyFAQActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyTermsListActivity
com.facebook.FacebookActivity
com.facebook.CustomTabActivity
com.facebook.CustomTabMainActivity
com.prime31.GoogleIABProxyActivity
com.google.games.bridge.NativeBridgeActivity
Services
com.nexonm.loh.usios.GCMIntentService
Receivers
com.google.android.gcm.GCMBroadcastReceiver
com.tapjoy.InstallReferrerReceiver
com.moblieapptracker.Tracker
com.nexonm.loh.usios.MatReceiver
Activity-related intent filters
kr.co.nexon.toy.android.ui.baseplate.NXToyPlateActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.banner.NXToyEndingBannerActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.auth.NXToyLoginSelectActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXUserAuthWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyCSActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyFAQActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.auth.NXToyTermsActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.etc.NXToyShareActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXJoinWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.baseplate.NXToyCustomerServiceActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXSearchIDPWActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyNoticeActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.baseplate.NXToyTermsListActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NPGetNexonSNActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NPLoginActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXJoinUserAuthWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.etc.NXToyCouponActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.auth.NXToyTermViewActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXJoinSelectActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.baseplate.NXToyHelpCenterActivity
actions: android.intent.action.VIEW
com.nexonm.loh.usios.AndroidAPI
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
kr.co.nexon.toy.android.ui.banner.NXToyFullBannerActivity
actions: android.intent.action.VIEW
Receiver-related intent filters
com.nexonm.loh.usios.MatReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nexonm.loh.usios
com.moblieapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
Contained files
Compression metadata
Contained files
2210
Uncompressed size
99856349
Highest datetime
2017-07-26 17:22:54
Lowest datetime
1980-01-01 09:00:00
Contained files by extension
dll
21
Contained files by type
unknown
979
Portable Executable
21
File identification
MD5 109a8be022c9433fd0b5db2ea0f281b1
SHA1 695a9befe93caa9b762a71a8c93685a0156040c5
SHA256 1ad180388362abffe1826853b6a07c74ff4d43022b1e4b9f675786d10b0f92ce
ssdeep
1572864:L2ZusfrkLFr1YrC9/2LfsnVgk/n6LGqwkw9jFMSXzQp+4DBtC0xfLiBj4gPFg:L2EsfALJt9/pXn6LB0jFMio+EBtC0xzr

File size 66.0 MB ( 69253780 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (38.1%)
Sweet Home 3D design (generic) (27.6%)
foobar2000 component (21.0%)
ZIP compressed archive (10.5%)
PrintFox/Pagefox bitmap (var. P) (2.6%)
Tags
apk contains-pe android

VirusTotal metadata
First submission 2017-08-04 19:08:07 UTC ( 1 year, 8 months ago )
Last submission 2017-08-04 23:46:32 UTC ( 1 year, 8 months ago )
File names legion-of-heroes-1.9.02.apk
legion-of-heroes.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!