× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 52ac1fc0bdc17789547427a1583ee1168b7c2ee241e0054814aa9a74db9c3718
File name: com.softwego.crackscreen.apk
Detection ratio: 0 / 61
Analysis date: 2018-02-01 06:26:24 UTC ( 1 year, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20180201
AegisLab 20180201
AhnLab-V3 20180131
Alibaba 20180131
ALYac 20180201
Antiy-AVL 20180201
Arcabit 20180201
Avast 20180201
Avast-Mobile 20180131
AVG 20180201
Avira (no cloud) 20180201
AVware 20180201
Baidu 20180201
BitDefender 20180201
Bkav 20180131
CAT-QuickHeal 20180131
ClamAV 20180201
CMC 20180201
Comodo 20180201
CrowdStrike Falcon (ML) 20170201
Cybereason 20171103
Cylance 20180201
Cyren 20180201
DrWeb 20180201
eGambit 20180201
Emsisoft 20180201
Endgame 20171130
ESET-NOD32 20180201
F-Prot 20180201
Fortinet 20180201
GData 20180201
Ikarus 20180131
Sophos ML 20180121
Jiangmin 20180201
K7AntiVirus 20180201
K7GW 20180131
Kaspersky 20180201
Kingsoft 20180201
Malwarebytes 20180201
MAX 20180201
McAfee 20180201
McAfee-GW-Edition 20180201
Microsoft 20180201
eScan 20180201
NANO-Antivirus 20180201
nProtect 20180201
Palo Alto Networks (Known Signatures) 20180201
Panda 20180131
Qihoo-360 20180201
Rising 20180201
SentinelOne (Static ML) 20180115
Sophos AV 20180201
SUPERAntiSpyware 20180201
Symantec 20180201
Symantec Mobile Insight 20180201
Tencent 20180201
TheHacker 20180130
TotalDefense 20180201
TrendMicro 20180201
TrendMicro-HouseCall 20180201
Trustlook 20180201
VBA32 20180131
VIPRE 20180201
ViRobot 20180201
Webroot 20180201
Yandex 20180130
Zillya 20180131
ZoneAlarm by Check Point 20180201
Zoner 20180201
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.softwego.crackscreen. The internal version number of the application is 30. The displayed version string of the application is 1.4.1. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
com.softwego.crackscreen.permission.C2D_MESSAGE (C2DM permission.)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
Activities
com.softwego.crackscreen.MenuActivity
com.softwego.crackscreen.CrackScreenActivity
com.softwego.crackscreen.SettingsActivity
com.google.android.gms.ads.AdActivity
com.startapp.android.publish.ads.list3d.List3DActivity
com.startapp.android.publish.adsCommon.activities.OverlayActivity
com.startapp.android.publish.adsCommon.activities.FullScreenActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.softwego.crackscreen.service.CrackScreenService
com.startapp.android.publish.common.metaData.PeriodicMetaDataService
com.startapp.android.publish.common.metaData.InfoEventService
com.google.android.gms.measurement.AppMeasurementService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.softwego.crackscreen.receiver.TriggerReceiver
com.startapp.android.publish.common.metaData.BootCompleteListener
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.softwego.crackscreen.MenuActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.softwego.crackscreen
com.startapp.android.publish.common.metaData.BootCompleteListener
actions: android.intent.action.BOOT_COMPLETED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
567
Uncompressed size
6691846
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
359
xml
200
mp3
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
359
XML
199
unknown
6
MP3
2
DEX
1
File identification
MD5 f95962e4f7eaf59823ee100541267645
SHA1 a643576602426d5b43a14ae881d30474dc1f2945
SHA256 52ac1fc0bdc17789547427a1583ee1168b7c2ee241e0054814aa9a74db9c3718
ssdeep
98304:58xonhT4KCqrWuJV3HCZEc0ug/JjxF2iA+IVL7QWuiomaFGX6FB156b:58aN4KCifH+B0uWJjwHQWua8GKTa

File size 4.3 MB ( 4543523 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android

VirusTotal metadata
First submission 2017-09-06 01:43:36 UTC ( 1 year, 6 months ago )
Last submission 2018-10-15 17:20:09 UTC ( 5 months, 1 week ago )
File names com.softwego.crackscreen-30.apk
com.softwego.crackscreen.apk
com.softwego.crackscreen.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!