× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 275112343beb18e467ee32bbd38ab5650b9f4abc0f633b7d7a70b34a36fdfc75
File name: legion-of-heroes-1.6.17.apk
Detection ratio: 0 / 57
Analysis date: 2016-04-21 17:13:09 UTC ( 2 years, 12 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160421
AegisLab 20160421
AhnLab-V3 20160421
Alibaba 20160421
ALYac 20160421
Antiy-AVL 20160421
Arcabit 20160421
Avast 20160421
AVG 20160421
Avira (no cloud) 20160421
AVware 20160421
Baidu 20160421
Baidu-International 20160421
BitDefender 20160421
Bkav 20160421
CAT-QuickHeal 20160421
ClamAV 20160421
CMC 20160421
Comodo 20160421
Cyren 20160421
DrWeb 20160421
Emsisoft 20160421
ESET-NOD32 20160421
F-Prot 20160421
F-Secure 20160421
Fortinet 20160421
GData 20160421
Ikarus 20160421
Jiangmin 20160421
K7AntiVirus 20160421
K7GW 20160421
Kaspersky 20160421
Kingsoft 20160421
Malwarebytes 20160421
McAfee 20160421
McAfee-GW-Edition 20160421
Microsoft 20160420
eScan 20160421
NANO-Antivirus 20160421
nProtect 20160421
Panda 20160421
Qihoo-360 20160421
Rising 20160421
Sophos AV 20160421
SUPERAntiSpyware 20160421
Symantec 20160421
Tencent 20160421
TheHacker 20160421
TotalDefense 20160421
TrendMicro 20160421
TrendMicro-HouseCall 20160421
VBA32 20160421
VIPRE 20160421
ViRobot 20160421
Yandex 20160420
Zillya 20160421
Zoner 20160421
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nexonm.loh.usios. The internal version number of the application is 1617. The displayed version string of the application is 1.6.17. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
com.nexonm.loh.usios.permission.C2D_MESSAGE (C2DM permission.)
android.permission.INTERNET (full Internet access)
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.KILL_BACKGROUND_PROCESS (Unknown permission from android reference)
android.permission.RESTART_PACKAGES (kill background processes)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nexonm.loh.usios.AndroidAPI
com.nexonm.loh.usios.MyAlert
com.prime31.GoogleIABProxyActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.google.example.games.pluginsupport.SignInHelperActivity
com.google.example.games.pluginsupport.SelectOpponentsHelperActivity
com.google.example.games.pluginsupport.InvitationInboxHelperActivity
com.facebook.FacebookActivity
Services
com.nexonm.loh.usios.GCMIntentService
Receivers
com.google.android.gcm.GCMBroadcastReceiver
com.tapjoy.InstallReferrerReceiver
com.moblieapptracker.Tracker
com.nexonm.loh.usios.MatReceiver
com.tapjoy.TapjoyReceiver
Activity-related intent filters
com.nexonm.loh.usios.AndroidAPI
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
Receiver-related intent filters
com.nexonm.loh.usios.MatReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nexonm.loh.usios
com.moblieapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
988
Uncompressed size
121262256
Highest datetime
2015-12-02 16:29:04
Lowest datetime
2015-07-04 03:29:24
Contained files by extension
png
219
xml
45
dll
19
so
6
dex
1
MF
1
RSA
1
js
1
mp4
1
SF
1
Contained files by type
unknown
697
PNG
219
XML
45
Portable Executable
19
ELF
6
DEX
1
MP3
1
File identification
MD5 724e618b95178af376e907f5d2e97753
SHA1 dd45885c1f1c957156adfffc842f77dfe650b7ef
SHA256 275112343beb18e467ee32bbd38ab5650b9f4abc0f633b7d7a70b34a36fdfc75
ssdeep

File size 41.2 MB ( 43251173 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (54.7%)
foobar2000 component (30.1%)
ZIP compressed archive (15.0%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2015-12-04 00:49:07 UTC ( 3 years, 4 months ago )
Last submission 2016-10-12 03:16:27 UTC ( 2 years, 6 months ago )
File names legion-of-heroes-1.6.17.apk
com.nexonm.loh.usios.apk
legion-of-heroes.apk
Legion of Heroes_v1.6.17.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!