× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4c209ba19ea75979fcbcc7c8a5576441da8c2a17788425d14978e87c4c880613
File name: legion-of-heroes-1.9.06.apk
Detection ratio: 0 / 60
Analysis date: 2017-08-30 20:01:09 UTC ( 1 year, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170830
AegisLab 20170830
AhnLab-V3 20170830
Alibaba 20170830
ALYac 20170830
Antiy-AVL 20170830
Arcabit 20170830
Avast 20170830
AVG 20170830
Avira (no cloud) 20170830
AVware 20170830
Baidu 20170830
BitDefender 20170830
Bkav 20170830
CAT-QuickHeal 20170830
ClamAV 20170830
CMC 20170828
Comodo 20170830
CrowdStrike Falcon (ML) 20170804
Cylance 20170830
Cyren 20170830
DrWeb 20170830
Emsisoft 20170830
Endgame 20170821
ESET-NOD32 20170830
F-Prot 20170830
F-Secure 20170830
Fortinet 20170830
GData 20170830
Ikarus 20170830
Sophos ML 20170822
Jiangmin 20170830
K7AntiVirus 20170830
K7GW 20170828
Kaspersky 20170830
Kingsoft 20170830
Malwarebytes 20170830
MAX 20170830
McAfee 20170830
McAfee-GW-Edition 20170830
Microsoft 20170830
eScan 20170830
NANO-Antivirus 20170830
nProtect 20170830
Palo Alto Networks (Known Signatures) 20170830
Panda 20170830
Qihoo-360 20170830
Rising 20170830
SentinelOne (Static ML) 20170806
Sophos AV 20170830
SUPERAntiSpyware 20170830
Symantec 20170830
Symantec Mobile Insight 20170830
TheHacker 20170828
TotalDefense 20170830
Trustlook 20170830
VBA32 20170830
VIPRE 20170830
ViRobot 20170830
Webroot 20170830
WhiteArmor 20170829
Yandex 20170830
Zillya 20170829
ZoneAlarm by Check Point 20170830
Zoner 20170830
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nexonm.loh.usios. The internal version number of the application is 1906. The displayed version string of the application is 1.9.06. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
com.nexonm.loh.usios.permission.C2D_MESSAGE (C2DM permission.)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.KILL_BACKGROUND_PROCESS (Unknown permission from android reference)
android.permission.RESTART_PACKAGES (kill background processes)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nexonm.loh.usios.AndroidAPI
com.nexonm.loh.usios.MyAlert
com.tapjoy.TJAdUnitActivity
com.tapjoy.TJContentActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.facebook.LoginActivity
com.nexon.android.ui.NPLoginActivity
kr.co.nexon.toy.android.ui.auth.NXToyLoginSelectActivity
kr.co.nexon.toy.android.ui.auth.NXToyTermsActivity
kr.co.nexon.toy.android.ui.auth.NXToyTermViewActivity
com.nexon.android.ui.NXJoinUserAuthWebActivity
com.nexon.android.ui.NXJoinWebActivity
com.nexon.android.ui.NXJoinSelectActivity
com.nexon.android.ui.NXUserAuthWebActivity
kr.co.nexon.toy.android.ui.etc.NXToyShareActivity
kr.co.nexon.toy.android.ui.banner.NXToyFullBannerActivity
com.nexon.android.ui.NXSearchIDPWActivity
com.nexon.android.ui.NPGetNexonSNActivity
kr.co.nexon.toy.android.ui.banner.NXToyEndingBannerActivity
kr.co.nexon.toy.android.ui.board.NXToyNoticeActivity
kr.co.nexon.toy.android.ui.etc.NXToyCouponActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyCustomerServiceActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyHelpCenterActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyPlateActivity
kr.co.nexon.toy.android.ui.board.NXToyWebActivity
kr.co.nexon.toy.android.ui.board.NXToyCSActivity
kr.co.nexon.toy.android.ui.board.NXToyFAQActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyTermsListActivity
com.facebook.FacebookActivity
com.facebook.CustomTabActivity
com.facebook.CustomTabMainActivity
com.prime31.GoogleIABProxyActivity
com.google.games.bridge.NativeBridgeActivity
Services
com.nexonm.loh.usios.GCMIntentService
Receivers
com.google.android.gcm.GCMBroadcastReceiver
com.tapjoy.InstallReferrerReceiver
com.moblieapptracker.Tracker
com.nexonm.loh.usios.MatReceiver
Activity-related intent filters
kr.co.nexon.toy.android.ui.baseplate.NXToyPlateActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.banner.NXToyEndingBannerActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.auth.NXToyLoginSelectActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXUserAuthWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyCSActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyFAQActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.auth.NXToyTermsActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.etc.NXToyShareActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXJoinWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.baseplate.NXToyCustomerServiceActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXSearchIDPWActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyNoticeActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.baseplate.NXToyTermsListActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NPGetNexonSNActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NPLoginActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXJoinUserAuthWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.etc.NXToyCouponActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.auth.NXToyTermViewActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXJoinSelectActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.baseplate.NXToyHelpCenterActivity
actions: android.intent.action.VIEW
com.nexonm.loh.usios.AndroidAPI
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
kr.co.nexon.toy.android.ui.banner.NXToyFullBannerActivity
actions: android.intent.action.VIEW
Receiver-related intent filters
com.nexonm.loh.usios.MatReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nexonm.loh.usios
com.moblieapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
Contained files
Compression metadata
Contained files
2210
Uncompressed size
99989829
Highest datetime
2017-08-30 17:09:02
Lowest datetime
1980-01-01 09:00:00
Contained files by extension
dll
21
Contained files by type
unknown
979
Portable Executable
21
File identification
MD5 75ac02de05c5356fbb26f286a250b920
SHA1 14fd35accd0d9c0903a6737d13b555c1f45358e1
SHA256 4c209ba19ea75979fcbcc7c8a5576441da8c2a17788425d14978e87c4c880613
ssdeep
1572864:k2zasfykOJXwOSzSwW9g6LTsnVgk/n60GUyUwN3F7sIX1Qp+4DBtC0xfLiBj4gPA:k2+sf1OJPsI9gdXn60ne3FwIFo+EBtCM

File size 66.4 MB ( 69631450 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (52.7%)
foobar2000 component (29.0%)
ZIP compressed archive (14.5%)
PrintFox/Pagefox bitmap (var. P) (3.6%)
Tags
apk contains-pe android

VirusTotal metadata
First submission 2017-08-30 20:01:09 UTC ( 1 year, 7 months ago )
Last submission 2018-12-13 15:58:13 UTC ( 4 months ago )
File names legion-of-heroes.apk
legion-of-heroes-1.9.06.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!