× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 35475c6d2e2b4ae78ffabe18511ac274dc62a2f3deda119e7e62ef0a945926df
File name: ZENONIA_5_v1.0.9.apk
Detection ratio: 0 / 61
Analysis date: 2017-07-14 23:54:45 UTC ( 1 year, 6 months ago )
Antivirus Result Update
Ad-Aware 20170714
AegisLab 20170714
AhnLab-V3 20170714
Alibaba 20170714
ALYac 20170714
Antiy-AVL 20170714
Arcabit 20170714
Avast 20170714
AVG 20170714
Avira (no cloud) 20170714
AVware 20170714
Baidu 20170714
BitDefender 20170714
Bkav 20170714
CAT-QuickHeal 20170714
ClamAV 20170714
CMC 20170714
Comodo 20170714
CrowdStrike Falcon (ML) 20170710
Cylance 20170715
Cyren 20170714
DrWeb 20170714
Emsisoft 20170714
Endgame 20170713
ESET-NOD32 20170714
F-Prot 20170714
F-Secure 20170714
Fortinet 20170629
GData 20170714
Ikarus 20170714
Sophos ML 20170607
Jiangmin 20170714
K7AntiVirus 20170714
K7GW 20170715
Kaspersky 20170714
Kingsoft 20170715
Malwarebytes 20170714
MAX 20170714
McAfee 20170715
McAfee-GW-Edition 20170714
Microsoft 20170714
eScan 20170714
NANO-Antivirus 20170714
nProtect 20170714
Palo Alto Networks (Known Signatures) 20170715
Panda 20170714
Qihoo-360 20170715
Rising 20170714
SentinelOne (Static ML) 20170516
Sophos AV 20170714
SUPERAntiSpyware 20170715
Symantec 20170714
Symantec Mobile Insight 20170713
Tencent 20170715
TheHacker 20170712
TotalDefense 20170714
TrendMicro-HouseCall 20170714
Trustlook 20170715
VBA32 20170714
VIPRE 20170714
ViRobot 20170714
Webroot 20170715
WhiteArmor 20170713
Yandex 20170714
Zillya 20170714
ZoneAlarm by Check Point 20170715
Zoner 20170714
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.gamevil.zenonia5.global. The internal version number of the application is 109. The displayed version string of the application is 1.0.9. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
com.gamevil.zenonia5.global.permission.C2D_MESSAGE (C2DM permission.)
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.READ_CONTACTS (read contact data)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.gamevil.nexus2.iap.GooglePlayIap
com.gamevil.zenonia5.global.DRMLicensing
com.gamevil.zenonia5.global.SkeletonLauncher
com.gamevil.lib.news.GvInterstitialActivity
com.gamevil.nexus2.cpi.GamevilGiftActivity
com.gamevil.nexus2.live.GamevilLiveActivity
com.gamevil.nexus2.iap.GooglePlayIap
com.gamevil.lib.downloader.GvDownloaderActivity
Services
com.gamevil.zenonia5.global.BillingService
Receivers
com.gamevil.zenonia5.global.C2dmBroadcastReceiver
com.gamevil.zenonia5.global.C2dmBroadcastReceiver
com.gamevil.zenonia5.global.BillingReceiver
Activity-related intent filters
com.gamevil.zenonia5.global.DRMLicensing
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.gamevil.zenonia5.global.SkeletonLauncher
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.gamevil.zenonia5.global.C2dmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION, com.gamevil.push.intent.LOCAL
categories: com.gamevil.zenonia5.global
com.gamevil.zenonia5.global.BillingReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
2219
Uncompressed size
37903518
Highest datetime
2013-03-04 16:59:12
Lowest datetime
2013-02-01 11:49:36
Contained files by extension
png
374
pzc
372
zt1
254
Contained files by type
unknown
626
PNG
374
File identification
MD5 22ac91d6392c5e2224c2211d7fe0114e
SHA1 22b7aa77de23fb99d0ecafe5a36430b67ee521e3
SHA256 35475c6d2e2b4ae78ffabe18511ac274dc62a2f3deda119e7e62ef0a945926df
ssdeep
786432:mvOBuNtsO1nwuh+ZM+qSsml4bm0VXvuJQ2mhXdAQM7A9+WR2YjcO:SOStsOKo+u+qW4bDu4XdAQUYjcO

File size 44.0 MB ( 46168323 bytes )
File type Android
Magic literal
Zip archive data, at least v1.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android ext-prg

VirusTotal metadata
First submission 2013-07-23 15:10:52 UTC ( 5 years, 5 months ago )
Last submission 2013-07-23 15:10:52 UTC ( 5 years, 5 months ago )
File names ZENONIA_5_v1.0.9.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
External programs launched
su
Opened files
/assets/auth_bg.png
/assets/auth_ci.png
/assets/btt_yes.png
/assets/btt_yes_over.png
/assets/btt_no.png
/assets/btt_no_over.png
/assets/btt_confirm.png
/assets/btt_confirm_over.png
/assets/auth_tit.png
/assets/bt_check.png
/assets/bt_uncheck.png
/assets/check_text.png
/assets/btt_normal.png
/assets/btt_touch.png
/assets/btt_disable.png
/assets/more_zen_points.png
/assets/news_b_top.png
/assets/news_b_top_over.png
/data/data/com.gamevil.zenonia5.global/files/cdm
/data/data/com.gamevil.zenonia5.global/files
/data/data/com.gamevil.zenonia5.global/files/.flurryagent.-4e24b3b5
/mnt/sdcard
/data
Accessed files
/data/data/com.gamevil.zenonia5.global/files
/data/data/com.gamevil.zenonia5.global/files/cdm
/data/data/com.gamevil.zenonia5.global/files/.flurryagent.-4e24b3b5
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
https://ws.tapjoyads.com/connect/udid=112087064159271&device_name=Nexus S&device_type=android&os_version=4.0.4&country_code=US&language=en&app_id=09dcd67d-d911-407c-837e-2456d0bb342e&app_version=1.0.9&library_version=8.0.1&screen_density=240&screen_layout_size=2&timestamp=1350551605&verifier=6d59b4727a3e0198c6489026ce4a8659a0cf05cc77641b6027c21b6777e25973
http://data.flurry.com/aap.do
000F000000000000000000000000000300700000013A732613F500144A4336484E4E5A47323843485A374A38524E52330005312E302E3900000013414E44343263646235363531633033653765350000013A7326137A0000013A7326137A0006000C6465766963652E6D6F64656C00074E657875732053000B6275696C642E6272616E640006676F6F676C6500086275696C642E696400064A524F303345000F76657273696F6E2E72656C656173650005342E302E34000C6275696C642E646576696365000663726573706F000D6275696C642E70726F647563740004736F6A750000
Accessed URIs
gamevil://com.gamevil.zenonia5.global.SkeletonLauncher