× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1c153d426f088a3e695fb215a33b044a50a4459fa5edbcca579af1e0d832047d
File name: legion-of-heroes-1.7.03.apk
Detection ratio: 0 / 56
Analysis date: 2016-03-23 06:11:16 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20160323
AegisLab 20160323
Yandex 20160316
AhnLab-V3 20160323
Alibaba 20160323
ALYac 20160323
Antiy-AVL 20160323
Arcabit 20160323
Avast 20160323
AVG 20160322
Avira (no cloud) 20160323
AVware 20160323
Baidu 20160322
Baidu-International 20160322
BitDefender 20160323
Bkav 20160322
ByteHero 20160323
CAT-QuickHeal 20160323
ClamAV 20160319
CMC 20160322
Comodo 20160323
Cyren 20160323
DrWeb 20160323
ESET-NOD32 20160323
F-Prot 20160323
F-Secure 20160323
Fortinet 20160323
GData 20160323
Ikarus 20160323
Jiangmin 20160323
K7AntiVirus 20160322
K7GW 20160323
Kaspersky 20160322
Malwarebytes 20160323
McAfee 20160323
McAfee-GW-Edition 20160323
Microsoft 20160323
eScan 20160323
NANO-Antivirus 20160323
nProtect 20160322
Panda 20160322
Qihoo-360 20160323
Rising 20160323
Sophos AV 20160323
SUPERAntiSpyware 20160323
Symantec 20160323
Tencent 20160323
TheHacker 20160321
TotalDefense 20160323
TrendMicro 20160323
TrendMicro-HouseCall 20160323
VBA32 20160322
VIPRE 20160323
ViRobot 20160323
Zillya 20160322
Zoner 20160323
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nexonm.loh.usios. The internal version number of the application is 1703. The displayed version string of the application is 1.7.03. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
com.nexonm.loh.usios.permission.C2D_MESSAGE (C2DM permission.)
android.permission.INTERNET (full Internet access)
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.KILL_BACKGROUND_PROCESS (Unknown permission from android reference)
android.permission.RESTART_PACKAGES (kill background processes)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nexonm.loh.usios.AndroidAPI
com.nexonm.loh.usios.MyAlert
com.prime31.GoogleIABProxyActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.google.example.games.pluginsupport.SignInHelperActivity
com.google.example.games.pluginsupport.SelectOpponentsHelperActivity
com.google.example.games.pluginsupport.InvitationInboxHelperActivity
com.facebook.FacebookActivity
Services
com.nexonm.loh.usios.GCMIntentService
Receivers
com.google.android.gcm.GCMBroadcastReceiver
com.tapjoy.InstallReferrerReceiver
com.moblieapptracker.Tracker
com.nexonm.loh.usios.MatReceiver
Activity-related intent filters
com.nexonm.loh.usios.AndroidAPI
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
Receiver-related intent filters
com.nexonm.loh.usios.MatReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nexonm.loh.usios
com.moblieapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
Contained files
Compression metadata
Contained files
1178
Uncompressed size
105665032
Highest datetime
2016-03-22 17:30:28
Lowest datetime
2016-01-19 16:51:12
Contained files by extension
png
92
dll
19
xml
6
dex
1
js
1
Contained files by type
unknown
882
PNG
92
Portable Executable
19
XML
6
DEX
1
File identification
MD5 8013a014836ce02073da2b8c45bcc2b7
SHA1 18be9a19628cb62f8f1acf1db458189b1915ba03
SHA256 1c153d426f088a3e695fb215a33b044a50a4459fa5edbcca579af1e0d832047d
ssdeep
786432:LLGPlT9naRVlmak9mrz84R9HhRkvDwBbLAt2SByLma9RavidGVZMKNp+ni6DbdwH:MDnomag04CGsVU7ByrRaadGVmKNp+nDC

File size 46.5 MB ( 48710004 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (54.7%)
foobar2000 component (30.1%)
ZIP compressed archive (15.0%)
Tags
apk contains-pe android

VirusTotal metadata
First submission 2016-03-23 06:11:16 UTC ( 3 years, 1 month ago )
Last submission 2016-10-12 03:16:44 UTC ( 2 years, 6 months ago )
File names legion-of-heroes-1.7.03.apk
legion-of-heroes.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!