× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3902428a6cc9b4508164f95de745928c9ea9b1d20d09cd598d6a72e15f23c99c
File name: com.ansangha.drparking4.apk
Detection ratio: 0 / 57
Analysis date: 2016-05-15 19:21:03 UTC ( 2 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160515
AegisLab 20160515
AhnLab-V3 20160515
Alibaba 20160513
ALYac 20160515
Antiy-AVL 20160515
Arcabit 20160515
Avast 20160515
AVG 20160515
Avira (no cloud) 20160515
AVware 20160511
Baidu 20160513
Baidu-International 20160515
BitDefender 20160515
Bkav 20160514
CAT-QuickHeal 20160514
ClamAV 20160515
CMC 20160510
Comodo 20160515
Cyren 20160515
DrWeb 20160515
Emsisoft 20160515
ESET-NOD32 20160515
F-Prot 20160515
F-Secure 20160515
Fortinet 20160515
GData 20160515
Ikarus 20160515
Jiangmin 20160515
K7AntiVirus 20160515
K7GW 20160515
Kaspersky 20160515
Kingsoft 20160515
Malwarebytes 20160515
McAfee 20160515
McAfee-GW-Edition 20160515
Microsoft 20160515
eScan 20160515
NANO-Antivirus 20160515
nProtect 20160513
Panda 20160515
Qihoo-360 20160515
Rising 20160515
Sophos AV 20160515
SUPERAntiSpyware 20160515
Symantec 20160515
Tencent 20160515
TheHacker 20160514
TotalDefense 20160515
TrendMicro 20160515
TrendMicro-HouseCall 20160515
VBA32 20160513
VIPRE 20160515
ViRobot 20160515
Yandex 20160515
Zillya 20160514
Zoner 20160515
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.ansangha.drparking4. The internal version number of the application is 2. The displayed version string of the application is 1.02. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.ansangha.drparking4.GameActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
Services
com.google.android.gms.analytics.AnalyticsService
com.google.android.gms.analytics.CampaignTrackingService
Receivers
com.google.android.gms.analytics.CampaignTrackingReceiver
Activity-related intent filters
com.ansangha.drparking4.GameActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.analytics.CampaignTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
279
Uncompressed size
16263546
Highest datetime
2015-09-14 21:40:12
Lowest datetime
2015-09-14 21:39:58
Contained files by extension
png
121
obj
75
jpg
52
ogg
18
xml
7
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
121
unknown
80
JPG
52
OGG
18
XML
7
DEX
1
File identification
MD5 1ef0e63c598411f794aa5fa981a927f9
SHA1 e818abfddcb642535ba94dec1ff09ca674f6cae9
SHA256 3902428a6cc9b4508164f95de745928c9ea9b1d20d09cd598d6a72e15f23c99c
ssdeep
196608:fxZiNgN409Z1LrB9AzTBrGIXaWCbJSy8xYQLTzInEj7IzeY+dMZJUnvocMCZL:fxZM09HvnAzTByIXG8NHUEjkzRwvosL

File size 12.9 MB ( 13532843 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android dyn-class

VirusTotal metadata
First submission 2015-09-18 15:49:19 UTC ( 3 years, 5 months ago )
Last submission 2016-10-04 03:38:41 UTC ( 2 years, 4 months ago )
File names dr-parking-4-1.02.apk
dr-parking-4.apk
beb1f5ded39519b96d7db8941c373a5ec7f80d31090b5c94999b9c9e06d039b98f960e07aa7be84d28d2f735a8a0bfbcaeca3d176d35428a154f2076daab09dd
com.ansangha.drparking4.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.ACCESS_NETWORK_STATE:com.ansangha.drparking4
android.permission.INTERNET:com.ansangha.drparking4
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
android.intent.action.BATTERY_CHANGED
Opened files
/data/data/com.ansangha.drparking4/cache/ads1000278051.jar
/mnt/sdcard
/data/data/com.ansangha.drparking4/cache
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Dynamically loaded classes
com.google.android.ads.zxxz.e
com.google.android.ads.zxxz.l
com.google.android.ads.zxxz.i
com.google.android.ads.zxxz.g
com.google.android.ads.zxxz.m
com.google.android.ads.zxxz.f
com.google.android.ads.zxxz.k
com.google.android.ads.zxxz.j
com.google.android.ads.zxxz.d
com.google.android.ads.zxxz.c
com.google.android.ads.zxxz.b
com.google.android.ads.zxxz.h
com.google.android.ads.zxxz.a
Accessed URIs
geo:0,0?q=donuts
http://www.google.com
market://details?id=com.google.android.gms.ads